A) Changing password B) Unauthorized access to protected systems and data C) A software update
A) Virus B) Password manager C) Firewall
A) Encryption B) Social engineering C) Firewall setup
A) Sends too many requests to make a website unavailable B) Steals passwords directly C) Installs antivirus
A) No difference B) DoS uses one attacker; DDoS uses multiple attackers C) DDoS is smaller than DoS
A) Backing up files B) Using strong passwords C) Clicking unknown links
A) A system update B) Someone who protects systems C) Someone who attempts to compromise security
A) Someone who gains unauthorized access B) A security guard C) A software program
A) A person skilled in computers and networks B) Only illegal C) Always malicious
A) Gray Hat B) White Hat C) Black Hat
A) Black Hat B) Gray Hat C) White Hat
A) Black Hat B) Gray Hat C) White Hat
A) Malicious hacker B) Government agent C) Ethical hacker
A) Criminal hacker B) Malicious hacker C) Ethical hacker
A) Encrypting files B) Updating software C) Secretly monitoring communications
A) All of the above B) Smartphones C) Instant messages
A) Makes internet faster B) Encrypts data for secure communication C) Removes ads
A) Normal battery use B) Clear signal C) Unknown sounds during calls
A) Changing passwords regularly B) Creating strong passwords C) Hacking passwords to gain unauthorized access
A) Data B) Wisdom C) Information
A) Processed and analyzed information B) Raw facts C) Stored files
A) Knowledge B) Wisdom C) Information
A) Authorized users B) Everyone C) The public
A) Utility B) Possession C) Accuracy
A) Availability B) Authenticity C) Confidentiality
A) Integrity B) Privacy C) Utility
A) Utility B) Accuracy
A) Possession B) Availability C) Confidentiality
A) CIA (Confidentiality, Integrity, Availability) B) Data, Info, Wisdom C) DoS, DDoS, MITM
A) Authenticity B) Availability C) Integrity
A) Integrity B) Confidentiality C) Possession
A) Encryption method B) Firewall C) Malware
A) Julius Caesar B) Alan Turing C) Rhanaeyra Targaryen
A) Operations security B) Physical security C) Network security
A) Communications security B) Physical security C) Network security
A) You change password B) You update software C) An intruder gains unauthorized access
A) Backup B) Firewall C) Malware
A) Encrypting files B) Updating antivirus C) Disguising as a legitimate organization
A) Caesar cipher B) Dracarys C) Rhanaeyra Targaryen
A) Allicent HightTower B) Julius Caesar C) Daenerys Targaryen
A) information assurance B) computer security
A) information assurance B) computer security
A) security B) assurance
A) Data, Information, Knowledge, Wisdom B) Data, Integrity, Knowledge, Work C) Digital, Information, Key, World
A) Information B) Knowledge C) Data
A) Knowledge B) Data C) Wisdom
A) Security B) Information C) Data
A) Processed and analyzed information B) Printed documents C) Random facts
A) Data B) Information C) Wisdom
A) security breach B) access C) london bridge
A) security breach B) data breach
A) DoS B) DDoS
A) DoS B) DDoS
A) badwire B) wiretapping C) wire
A) Frontdoor B) Backdoor
A) Secrecy B) Anonymity C) Privacy
A) Secrecy B) Privacy C) Anonymity
A) Privacy B) Secrecy C) Anonymity
A) Tangible assets like buildings, computers, and equipment B) Passwords C) Emails
A) Communications security B) Physical security C) Network security
A) Physical security B) Personal security C) Operations security
A) Personal security B) Communications security C) Operations security
A) Cyersecurity B) Information Security C) Security
A) IPO B) DIKW C) GIGO
A) data B) knowledge C) wisdom tooth
A) Network Security B) Computer security C) Personal security
A) kalapastanganan B) diet pepsi C) data integrity
A) Fabrication B) Modification C) Interception
A) Interruption B) Interception C) Fabrication
A) Interruption B) Fabrication C) Modification
A) Fabrication B) Modification C) Interruption |