Security Attacks - Midterm

Security Attacks - Midterm

University

19 Qs

quiz-placeholder

Similar activities

Software and Operating Systems Quiz

Software and Operating Systems Quiz

University

20 Qs

email protocols

email protocols

University

20 Qs

Information and Communication Technology Security - Pre-Test

Information and Communication Technology Security - Pre-Test

University

20 Qs

RCSA & IT Risk Mgmt

RCSA & IT Risk Mgmt

University

20 Qs

Cloud Computing 04

Cloud Computing 04

University

20 Qs

Telecommunications

Telecommunications

University

20 Qs

6INFOMAN (Recitation)

6INFOMAN (Recitation)

University - Professional Development

20 Qs

PRC3 - MIDTERM EXAM 2024 PART 2

PRC3 - MIDTERM EXAM 2024 PART 2

University

14 Qs

Security Attacks - Midterm

Security Attacks - Midterm

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Rdy Garcia

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 2 pts

Constraints means

2.

FILL IN THE BLANK QUESTION

1 min • 2 pts

Aside from CIA Triad, what are the 2A's added in Security Objectives

3.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Information is not made available or disclosed to unauthorized individuals, entities or processes.

Confidentiality

Integrity

Availability

Authenticity

Accountability

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Ensures that systems work promptly and the service is not denied to authorized users.

Confidentiality

Integrity

Availability

Authenticity

Accountability

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

The property of being genuine and being able to verified and trusted; confidence in the validity of transmission, a message, or message originator.

Confidentiality

Integrity

Availability

Authenticity

Accountability

6.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid transaction disputes.

Confidentiality

Integrity

Availability

Authenticity

Accountability

7.

FILL IN THE BLANK QUESTION

1 min • 2 pts

OSI stands for

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers