Nguyên lý an toàn thông tin

Nguyên lý an toàn thông tin

University

28 Qs

quiz-placeholder

Similar activities

Use of different forms of notation

Use of different forms of notation

9th Grade - University

24 Qs

Database Technologies Quiz

Database Technologies Quiz

University

25 Qs

Quiz_3

Quiz_3

University

25 Qs

DBMS1 QUIZ2

DBMS1 QUIZ2

University

26 Qs

FOS  QUIZ 7

FOS QUIZ 7

University

25 Qs

Software Engineering Quiz

Software Engineering Quiz

University

26 Qs

Mobile Security Quiz

Mobile Security Quiz

University

25 Qs

IT 312 (SIA) LONG QUIZ REVIEWER

IT 312 (SIA) LONG QUIZ REVIEWER

University

30 Qs

Nguyên lý an toàn thông tin

Nguyên lý an toàn thông tin

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Vân Cẩm

Used 4+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of security in the context of information
systems?

Enhancing system speed

Maximizing resource utilization

Ensuring confidentiality, integrity, Non-repudiation and availability

Minimizing software complexity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "confidentiality" mean in the context of
security?

nsuring data is accurate and unaltered

Protecting data from unauthorized access

Maximizing system performance

Preventing data loss during hardware failures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a security measure to ensure
"integrity"?

Firewalls

Antivirus software

Data encryption

Digital signatures

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a "Denial of Service" (DoS) attack?

Unauthorized access to sensitive data

Altering data without detection

Disrupting or degrading system availability

Bypassing firewalls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves tricking individuals into divulging
sensitive information, such as passwords or credit card numbers?

Denial of Service (DoS)

. Spoofing

Phishing

. Man-in-the-Middle (MitM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a "Brute Force" attack in information
security?

Gaining unauthorized access by exploiting system vulnerabilities

Decrypting encrypted data through trial and error

Disrupting network communication

. Infecting systems with malicious software

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of a "Zero-Day" exploit?

a. It targets previously unknown vulnerabilities

b. It relies on social engineering techniques

c. It only affects outdated software

d. It requires physical access to the target system

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?