Cyber Security Essentials -Quiz 2 12th august

Cyber Security Essentials -Quiz 2 12th august

University

10 Qs

quiz-placeholder

Similar activities

Cloud Computing Quiz

Cloud Computing Quiz

University

10 Qs

Structured Cabling

Structured Cabling

University

10 Qs

DBMS LAB QUIZ

DBMS LAB QUIZ

University

15 Qs

Digital Etiquette

Digital Etiquette

4th Grade - University

15 Qs

Quiz on Cyber Security

Quiz on Cyber Security

University

10 Qs

ICT-BEd_4th Semester

ICT-BEd_4th Semester

10th Grade - University

15 Qs

UAS Audit Sistem Informasi

UAS Audit Sistem Informasi

University

10 Qs

Cybersecurity

Cybersecurity

University

12 Qs

Cyber Security Essentials -Quiz 2 12th august

Cyber Security Essentials -Quiz 2 12th august

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Udhayakumar Shanmugam

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To ensure ....................................., the system uses digital signatures to verify that transactions are authorized and unaltered

data safety

data integrity

data confedentiality

data availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a mathematical function used in cryptography which takes variable length as input and returns an output of fixed length

Hashing

Digital Signature

Encryption

Authenticatio

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following the correctly represent "Availability"?

Availability =MTBF/MTBF + MTTR

Availability =MTTR/MTBF + MTTR

Availability =MTBF/ MTTR

Availability =MTTR/ MTBF

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Infrastructure Security, Operational Security and Digital Forensics are some of the procedures that are done by.................................

Red Team

Blue Team

Purple Team

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A .................................... is a security system that monitors and controls network traffic based on predefined rules, acting as a barrier between a trusted network and untrusted networks like the internet

Firewall

Intrusion Detection System

Internet Gateway

FireFox

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They are small text files that websites store on a user's device, enabling them to "remember" information about the user's visit. This remembrance allows websites to personalize content, maintain user sessions (like keeping you logged in), and track browsing behaviour for analytics.

Cookies

Sessions

Authenticator App

Browsing History

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An authenticator app is a mobile application that provides an extra layer of security to your online accounts by generating...................................................................... These passwords are used for two-factor authentication (2FA) and help protect your accounts from unauthorized access.

Numerical Password

One Time Passwords(OTPs)

Time-based one-time passwords (TOTPs)

High Security Passwords

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?