A) Changing password B) Unauthorized access to protected systems and data C) A software update
A) Password manager B) Virus C) Firewall
A) Encryption B) Social engineering C) Firewall setup
A) Sends too many requests to make a website unavailable B) Steals passwords directly C) Installs antivirus
A) No difference B) DoS uses one attacker; DDoS uses multiple attackers C) DDoS is smaller than DoS
A) Using strong passwords B) Clicking unknown links C) Backing up files
A) A system update B) Someone who protects systems C) Someone who attempts to compromise security
A) A security guard B) A software program C) Someone who gains unauthorized access
A) Only illegal B) A person skilled in computers and networks C) Always malicious
A) Black Hat B) White Hat C) Gray Hat
A) White Hat B) Gray Hat C) Black Hat
A) Black Hat B) Gray Hat C) White Hat
A) Ethical hacker B) Government agent C) Malicious hacker
A) Ethical hacker B) Malicious hacker C) Criminal hacker
A) Encrypting files B) Updating software C) Secretly monitoring communications
A) All of the above B) Smartphones C) Instant messages
A) Makes internet faster B) Removes ads C) Encrypts data for secure communication
A) Clear signal B) Unknown sounds during calls C) Normal battery use
A) Hacking passwords to gain unauthorized access B) Creating strong passwords C) Changing passwords regularly
A) Information B) Wisdom C) Data
A) Processed and analyzed information B) Stored files C) Raw facts
A) Information B) Wisdom C) Knowledge
A) Everyone B) Authorized users C) The public
A) Possession B) Accuracy C) Utility
A) Availability B) Confidentiality C) Authenticity
A) Utility B) Privacy C) Integrity
A) Accuracy B) Utility
A) Confidentiality B) Availability C) Possession
A) Data, Info, Wisdom B) DoS, DDoS, MITM C) CIA (Confidentiality, Integrity, Availability)
A) Availability B) Authenticity C) Integrity
A) Integrity B) Possession C) Confidentiality
A) Encryption method B) Firewall C) Malware
A) Julius Caesar B) Rhanaeyra Targaryen C) Alan Turing
A) Physical security B) Operations security C) Network security
A) Physical security B) Network security C) Communications security
A) You update software B) You change password C) An intruder gains unauthorized access
A) Malware B) Backup C) Firewall
A) Encrypting files B) Disguising as a legitimate organization C) Updating antivirus
A) Caesar cipher B) Rhanaeyra Targaryen C) Dracarys
A) Daenerys Targaryen B) Julius Caesar C) Allicent HightTower
A) computer security B) information assurance
A) computer security B) information assurance
A) assurance B) security
A) Digital, Information, Key, World B) Data, Integrity, Knowledge, Work C) Data, Information, Knowledge, Wisdom
A) Data B) Information C) Knowledge
A) Knowledge B) Data C) Wisdom
A) Data B) Information C) Security
A) Random facts B) Processed and analyzed information C) Printed documents
A) Information B) Wisdom C) Data
A) security breach B) access C) london bridge
A) security breach B) data breach
A) DoS B) DDoS
A) DDoS B) DoS
A) badwire B) wiretapping C) wire
A) Backdoor B) Frontdoor
A) Anonymity B) Secrecy C) Privacy
A) Anonymity B) Secrecy C) Privacy
A) Secrecy B) Privacy C) Anonymity
A) Passwords B) Tangible assets like buildings, computers, and equipment C) Emails
A) Network security B) Communications security C) Physical security
A) Personal security B) Physical security C) Operations security
A) Operations security B) Communications security C) Personal security
A) Cyersecurity B) Information Security C) Security
A) IPO B) GIGO C) DIKW
A) knowledge B) wisdom tooth C) data
A) Computer security B) Network Security C) Personal security
A) kalapastanganan B) diet pepsi C) data integrity
A) Interception B) Fabrication C) Modification
A) Fabrication B) Interception C) Interruption
A) Fabrication B) Interruption C) Modification
A) Interruption B) Modification C) Fabrication |