class-2

class-2

University

31 Qs

quiz-placeholder

Similar activities

Bono 8 Fundamentos de Gestión

Bono 8 Fundamentos de Gestión

University

27 Qs

Personality Quiz

Personality Quiz

4th Grade - University

29 Qs

Tema 5. Franqueo, deposito, entrega, recogida y distribución

Tema 5. Franqueo, deposito, entrega, recogida y distribución

University

26 Qs

Tributos

Tributos

University

30 Qs

El Presente

El Presente

9th Grade - University

30 Qs

Quiz Putra 20 Maret 2020

Quiz Putra 20 Maret 2020

University

26 Qs

time to play

time to play

1st Grade - University

26 Qs

Examen Diagnóstico Estrategias de Mercadotecnia (09-Nov-23)

Examen Diagnóstico Estrategias de Mercadotecnia (09-Nov-23)

University

26 Qs

class-2

class-2

Assessment

Quiz

Other

University

Practice Problem

Medium

Created by

adam ali

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Anti-virus

Firewall

Encryption

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Cyber criminal

Phishing

Attack password

Online predator

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aarav is working on a project to secure his company's information system. He needs to ensure the CIA triad principles are followed. What does the C in CIA stand for?

Consistency

Confidentiality

Content

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James, Florence, and Poppy are working on a cybersecurity project. They are discussing which state of data is the easiest to protect. Can you help them?

Data at rest, like the files stored on their computers

Data in transit, like emails they are sending to each other

Data in process, like the data being used by their software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ava is sending a confidential document to James over the internet. Which technology should she use to ensure the document's confidentiality?

Encryption

Hashing

Access Control

Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Benjamin is working on a project to ensure data integrity. Which technology is the most used example of integrity in this context?

Firewalls

Hashing

Authentication

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe sending packets or requests to another system to gain information to be used in a subsequent attack?

Risk analysis

Risk assessment

Scanning

Spear Phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?