
CHAPTER 1
Authored by DR PALANIAPPAN
Computers
University
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Following are the threat assessment factors EXCEPT:
Attractiveness of the system
The nature of the information on the system
Traffic to the system
Capacity of data on the system
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Determine whom the statement best describes?
He is a programming expert who breaks into system security with a malicious intent to steal data or to destroy the system.
White hat hacker
Script kiddy
Cracker
Gray hat hacker
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Data packet header contains following information EXCEPT.
Source IP address
Data
Packet size
type of data
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following attacks aims to prevent legitimate users from accessing a system?
Denial of service
Social engineering
Worms
Trojan horse
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of computer security?
To allow unauthorized access
To ensure data is destroyed
To increase network speed
To protect data integrity, confidentiality, and availability
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the concept of "confidentiality" in computer security?
Ensuring data is available when needed
Protecting data from unauthorized access
Guaranteeing that data is accurate
Allowing unrestricted data sharing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a social engineering attack?
Phishing
DDoS
SQL Injection
Man-in-the-Middle
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?