Surprise Quiz - I - SIE -25-26

Surprise Quiz - I - SIE -25-26

University

10 Qs

quiz-placeholder

Similar activities

Linh kiện thụ động

Linh kiện thụ động

University

15 Qs

CYBERSYNAPSE

CYBERSYNAPSE

University

15 Qs

Big Data e Industria 4.0

Big Data e Industria 4.0

University

10 Qs

Atividade direcionada - Materiais betuminosos

Atividade direcionada - Materiais betuminosos

University

10 Qs

Untitled Quiz

Untitled Quiz

University

14 Qs

Hidrologi_20032025

Hidrologi_20032025

University

10 Qs

MATSCI ATOMIC BONDING

MATSCI ATOMIC BONDING

University

15 Qs

Surprise Quiz - I - SIE -25-26

Surprise Quiz - I - SIE -25-26

Assessment

Quiz

Engineering

University

Practice Problem

Easy

Created by

Jaishree ECE

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Relate which of the following is an example of a physical security breach?

Capturing a credit card from a web server application

Hacking a SQL server in order to locate a credit card number

Stealing a laptop to acquire credit card numbers

Sniffing a credit card number from packets sent on a wireless hotspot

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

B received a message from A. It can neither confirm if A sent it nor ascertain that the message was untampered. Identify the violation occurred during the transmission of message.

Confidentiality and Authentication

Confidentiality and Message integrity

Authentication and Message integrity

Authentication and Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the testing technique used for validation testing?

Black box testing

Yellow ox testing

White box testing

Grey box testing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the public key encryption technique if A wants to send an encrypted message

A encrypts message using his private key

A encrypts message B's private key

A encrypts message using B’s public key

A encrypts message using his public key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the component which stores websites and their related files for viewing on the internet?

Web Client

Web Server

Web Browser

WWW

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the countermeasure for a buffer overflow attack?

Input field length validation

Encryption

Firewall

Use of Web Forms

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside the building is causing what type of security breach?

Physical

Technical

Operational

Remote access

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?