System Security Quiz

System Security Quiz

University

10 Qs

quiz-placeholder

Similar activities

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

cyber security workshop

cyber security workshop

University

10 Qs

Quiz on Basics of Computer Security and SSH

Quiz on Basics of Computer Security and SSH

University

12 Qs

QuizChapter2

QuizChapter2

University

11 Qs

Cyber IT Act: Online Fraud Prevention

Cyber IT Act: Online Fraud Prevention

University

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Computer Science

Computer Science

University

15 Qs

Hacking

Hacking

University

12 Qs

System Security Quiz

System Security Quiz

Assessment

Quiz

Computers

University

Hard

Created by

NAZIRAH HAMID

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does confidentiality in system security refer to?

Preventing unauthorized access to sensitive information

Guaranteeing system availability

Monitoring user activity

Ensuring data is accurate and trustworthy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware?

Denial of Service

Code Injection

Trojan

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a buffer overflow attack?

An attack that intercepts network traffic

An attack that floods a network with traffic

An attack that installs malicious software

An attack that exploits memory handling vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a Denial of Service (DoS) attack?

To gain unauthorized access

To steal sensitive data

To install malware on a system

To overwhelm systems and prevent access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method of user authentication?

Malware Detection

Data Encryption

Network Sniffing

Multi-factor Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of multi-factor authentication?

To simplify user access

To monitor user activity

To require multiple forms of verification

To eliminate the need for passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do attackers typically exploit buffer overflow vulnerabilities?

By flooding the network with requests

By intercepting network traffic

By inserting malicious code into applications

By overwriting memory locations with crafted input

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?