Search Header Logo

IT Security - 03

Authored by Kavini Amandi

Computers

University

Used 3+ times

IT Security - 03
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary goal of secure design?

To create stylish user interfaces

To react after attacks occur

To prevent, detect, and mitigate cyber threats proactively

To speed up software development

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a vulnerability?

A firewall setting

A type of antivirus software

A weakness in a system that can be exploited

An update to improve software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a human-related vulnerability?

Buffer Overflow

Firmware Attack

Phishing

SQL Injection

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which technique is used in smishing attacks?

Emails

Voice calls

SMS messages

Social media ads

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the term for vulnerabilities that are unknown to developers and don’t yet have a patch?

Cross-site scripting

Zero-Day Vulnerabilities

API Misuse

Side-Channel Attacks

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a type of software vulnerability?

Weak User Credentials

Cache Attack

SQL Injection

Data Remanence

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does RBAC stand for?

Role-Based Access Control

Remote-Based Audit Control

Role-Bound Authentication Channel

Reliable Binary Access Code

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers