
Nguyên lý an toàn thông tin
Authored by Vân Cẩm
Information Technology (IT)
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
28 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of security in the context of information
systems?
Enhancing system speed
Maximizing resource utilization
Ensuring confidentiality, integrity, Non-repudiation and availability
Minimizing software complexity
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "confidentiality" mean in the context of
security?
nsuring data is accurate and unaltered
Protecting data from unauthorized access
Maximizing system performance
Preventing data loss during hardware failures
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a security measure to ensure
"integrity"?
Firewalls
Antivirus software
Data encryption
Digital signatures
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of a "Denial of Service" (DoS) attack?
Unauthorized access to sensitive data
Altering data without detection
Disrupting or degrading system availability
Bypassing firewalls
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack involves tricking individuals into divulging
sensitive information, such as passwords or credit card numbers?
Denial of Service (DoS)
. Spoofing
Phishing
. Man-in-the-Middle (MitM)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a "Brute Force" attack in information
security?
Gaining unauthorized access by exploiting system vulnerabilities
Decrypting encrypted data through trial and error
Disrupting network communication
. Infecting systems with malicious software
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a characteristic of a "Zero-Day" exploit?
a. It targets previously unknown vulnerabilities
b. It relies on social engineering techniques
c. It only affects outdated software
d. It requires physical access to the target system
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?