Search Header Logo

Nguyên lý an toàn thông tin

Authored by Vân Cẩm

Information Technology (IT)

University

Used 4+ times

Nguyên lý an toàn thông tin
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of security in the context of information
systems?

Enhancing system speed

Maximizing resource utilization

Ensuring confidentiality, integrity, Non-repudiation and availability

Minimizing software complexity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "confidentiality" mean in the context of
security?

nsuring data is accurate and unaltered

Protecting data from unauthorized access

Maximizing system performance

Preventing data loss during hardware failures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a security measure to ensure
"integrity"?

Firewalls

Antivirus software

Data encryption

Digital signatures

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a "Denial of Service" (DoS) attack?

Unauthorized access to sensitive data

Altering data without detection

Disrupting or degrading system availability

Bypassing firewalls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves tricking individuals into divulging
sensitive information, such as passwords or credit card numbers?

Denial of Service (DoS)

. Spoofing

Phishing

. Man-in-the-Middle (MitM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a "Brute Force" attack in information
security?

Gaining unauthorized access by exploiting system vulnerabilities

Decrypting encrypted data through trial and error

Disrupting network communication

. Infecting systems with malicious software

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of a "Zero-Day" exploit?

a. It targets previously unknown vulnerabilities

b. It relies on social engineering techniques

c. It only affects outdated software

d. It requires physical access to the target system

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?