Surprise Quiz - I - SIE -25-26

Surprise Quiz - I - SIE -25-26

University

10 Qs

quiz-placeholder

Similar activities

ANOVA

ANOVA

University

10 Qs

Input & Output Interfacing Raspberry Pi Pico

Input & Output Interfacing Raspberry Pi Pico

University

10 Qs

Embedded Systems

Embedded Systems

University

10 Qs

Bioenergy

Bioenergy

University

15 Qs

Weather

Weather

3rd Grade - University

11 Qs

Explicación MRP

Explicación MRP

University

10 Qs

unit1 MCQ

unit1 MCQ

University

15 Qs

Ética profesional en Ingeniería

Ética profesional en Ingeniería

University

10 Qs

Surprise Quiz - I - SIE -25-26

Surprise Quiz - I - SIE -25-26

Assessment

Quiz

Engineering

University

Easy

Created by

Jaishree ECE

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Relate which of the following is an example of a physical security breach?

Capturing a credit card from a web server application

Hacking a SQL server in order to locate a credit card number

Stealing a laptop to acquire credit card numbers

Sniffing a credit card number from packets sent on a wireless hotspot

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

B received a message from A. It can neither confirm if A sent it nor ascertain that the message was untampered. Identify the violation occurred during the transmission of message.

Confidentiality and Authentication

Confidentiality and Message integrity

Authentication and Message integrity

Authentication and Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the testing technique used for validation testing?

Black box testing

Yellow ox testing

White box testing

Grey box testing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the public key encryption technique if A wants to send an encrypted message

A encrypts message using his private key

A encrypts message B's private key

A encrypts message using B’s public key

A encrypts message using his public key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the component which stores websites and their related files for viewing on the internet?

Web Client

Web Server

Web Browser

WWW

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the countermeasure for a buffer overflow attack?

Input field length validation

Encryption

Firewall

Use of Web Forms

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside the building is causing what type of security breach?

Physical

Technical

Operational

Remote access

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?