Search Header Logo

CHAPTER 1

Authored by DR PALANIAPPAN

Computers

University

Used 5+ times

CHAPTER 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Following are the threat assessment factors EXCEPT:

Attractiveness of the system

The nature of the information on the system

Traffic to the system

Capacity of data on the system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Determine whom the statement best describes? 

 

He is a programming expert who breaks into system security  with a malicious intent to steal data or to destroy the system.

White hat hacker

Script kiddy

Cracker

Gray hat hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data packet header contains following information EXCEPT.

Source IP address

Data

Packet size

type of data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks aims to prevent legitimate users from accessing a system?

Denial of service

Social engineering

Worms

Trojan horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of computer security?

To allow unauthorized access

To ensure data is destroyed

To increase network speed

To protect data integrity, confidentiality, and availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the concept of "confidentiality" in computer security?

Ensuring data is available when needed

Protecting data from unauthorized access

Guaranteeing that data is accurate

Allowing unrestricted data sharing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Phishing

DDoS

SQL Injection

Man-in-the-Middle

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?