CHAPTER 1

CHAPTER 1

University

12 Qs

quiz-placeholder

Similar activities

TES AWAL MODUL 2

TES AWAL MODUL 2

University

10 Qs

Algo Quiz

Algo Quiz

University

16 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

uas-siber

uas-siber

University

10 Qs

ระบบปฏิบัติการ ชุดที่ 1

ระบบปฏิบัติการ ชุดที่ 1

University

15 Qs

have fun with econometrics

have fun with econometrics

University

15 Qs

PSSI Chp 1 dan 2

PSSI Chp 1 dan 2

University

12 Qs

CHAPTER 1

CHAPTER 1

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

DR PALANIAPPAN

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Following are the threat assessment factors EXCEPT:

Attractiveness of the system

The nature of the information on the system

Traffic to the system

Capacity of data on the system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Determine whom the statement best describes? 

 

He is a programming expert who breaks into system security  with a malicious intent to steal data or to destroy the system.

White hat hacker

Script kiddy

Cracker

Gray hat hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data packet header contains following information EXCEPT.

Source IP address

Data

Packet size

type of data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks aims to prevent legitimate users from accessing a system?

Denial of service

Social engineering

Worms

Trojan horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of computer security?

To allow unauthorized access

To ensure data is destroyed

To increase network speed

To protect data integrity, confidentiality, and availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the concept of "confidentiality" in computer security?

Ensuring data is available when needed

Protecting data from unauthorized access

Guaranteeing that data is accurate

Allowing unrestricted data sharing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Phishing

DDoS

SQL Injection

Man-in-the-Middle

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers