CHAPTER 1

CHAPTER 1

University

12 Qs

quiz-placeholder

Similar activities

QUIZ 3- BAEN/ITED

QUIZ 3- BAEN/ITED

University

10 Qs

Introduction to Network Security - Episode 1

Introduction to Network Security - Episode 1

University

10 Qs

Introduction to Info Sec - Week 1

Introduction to Info Sec - Week 1

University

7 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

Chapter 1 quizzes

Chapter 1 quizzes

University

13 Qs

Quiz  Cybersecurity Audit

Quiz Cybersecurity Audit

University

15 Qs

CBY 207 Module 1 -Quiz2

CBY 207 Module 1 -Quiz2

University

7 Qs

PRE TEST PERTEMUAN 10 KOMPUTER DAN MASYARAKAT - CYBER CRIME

PRE TEST PERTEMUAN 10 KOMPUTER DAN MASYARAKAT - CYBER CRIME

University

10 Qs

CHAPTER 1

CHAPTER 1

Assessment

Quiz

Computers

University

Medium

Created by

DR PALANIAPPAN

Used 5+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Following are the threat assessment factors EXCEPT:

Attractiveness of the system

The nature of the information on the system

Traffic to the system

Capacity of data on the system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Determine whom the statement best describes? 

 

He is a programming expert who breaks into system security  with a malicious intent to steal data or to destroy the system.

White hat hacker

Script kiddy

Cracker

Gray hat hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data packet header contains following information EXCEPT.

Source IP address

Data

Packet size

type of data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks aims to prevent legitimate users from accessing a system?

Denial of service

Social engineering

Worms

Trojan horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of computer security?

To allow unauthorized access

To ensure data is destroyed

To increase network speed

To protect data integrity, confidentiality, and availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the concept of "confidentiality" in computer security?

Ensuring data is available when needed

Protecting data from unauthorized access

Guaranteeing that data is accurate

Allowing unrestricted data sharing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Phishing

DDoS

SQL Injection

Man-in-the-Middle

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?