Search Header Logo

Surprise Quiz - I - SIE -25-26

Authored by Jaishree ECE

Engineering

University

Used 2+ times

Surprise Quiz - I - SIE -25-26
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Relate which of the following is an example of a physical security breach?

Capturing a credit card from a web server application

Hacking a SQL server in order to locate a credit card number

Stealing a laptop to acquire credit card numbers

Sniffing a credit card number from packets sent on a wireless hotspot

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

B received a message from A. It can neither confirm if A sent it nor ascertain that the message was untampered. Identify the violation occurred during the transmission of message.

Confidentiality and Authentication

Confidentiality and Message integrity

Authentication and Message integrity

Authentication and Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the testing technique used for validation testing?

Black box testing

Yellow ox testing

White box testing

Grey box testing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the public key encryption technique if A wants to send an encrypted message

A encrypts message using his private key

A encrypts message B's private key

A encrypts message using B’s public key

A encrypts message using his public key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the component which stores websites and their related files for viewing on the internet?

Web Client

Web Server

Web Browser

WWW

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the countermeasure for a buffer overflow attack?

Input field length validation

Encryption

Firewall

Use of Web Forms

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside the building is causing what type of security breach?

Physical

Technical

Operational

Remote access

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?