A) Unauthorized access to protected systems and data B) Changing password C) A software update
A) Virus B) Password manager C) Firewall
A) Social engineering B) Firewall setup C) Encryption
A) Installs antivirus B) Steals passwords directly C) Sends too many requests to make a website unavailable
A) DDoS is smaller than DoS B) DoS uses one attacker; DDoS uses multiple attackers C) No difference
A) Backing up files B) Using strong passwords C) Clicking unknown links
A) A system update B) Someone who protects systems C) Someone who attempts to compromise security
A) A security guard B) A software program C) Someone who gains unauthorized access
A) Only illegal B) A person skilled in computers and networks C) Always malicious
A) White Hat B) Gray Hat C) Black Hat
A) White Hat B) Gray Hat C) Black Hat
A) Gray Hat B) Black Hat C) White Hat
A) Malicious hacker B) Government agent C) Ethical hacker
A) Ethical hacker B) Malicious hacker C) Criminal hacker
A) Encrypting files B) Updating software C) Secretly monitoring communications
A) All of the above B) Instant messages C) Smartphones
A) Encrypts data for secure communication B) Removes ads C) Makes internet faster
A) Clear signal B) Normal battery use C) Unknown sounds during calls
A) Hacking passwords to gain unauthorized access B) Changing passwords regularly C) Creating strong passwords
A) Wisdom B) Data C) Information
A) Raw facts B) Stored files C) Processed and analyzed information
A) Knowledge B) Wisdom C) Information
A) Everyone B) Authorized users C) The public
A) Accuracy B) Possession C) Utility
A) Availability B) Authenticity C) Confidentiality
A) Privacy B) Integrity C) Utility
A) Accuracy B) Utility
A) Confidentiality B) Possession C) Availability
A) Data, Info, Wisdom B) CIA (Confidentiality, Integrity, Availability) C) DoS, DDoS, MITM
A) Availability B) Integrity C) Authenticity
A) Possession B) Confidentiality C) Integrity
A) Malware B) Firewall C) Encryption method
A) Julius Caesar B) Alan Turing C) Rhanaeyra Targaryen
A) Network security B) Physical security C) Operations security
A) Physical security B) Communications security C) Network security
A) You update software B) An intruder gains unauthorized access C) You change password
A) Firewall B) Backup C) Malware
A) Disguising as a legitimate organization B) Encrypting files C) Updating antivirus
A) Caesar cipher B) Rhanaeyra Targaryen C) Dracarys
A) Julius Caesar B) Allicent HightTower C) Daenerys Targaryen
A) information assurance B) computer security
A) computer security B) information assurance
A) security B) assurance
A) Digital, Information, Key, World B) Data, Information, Knowledge, Wisdom C) Data, Integrity, Knowledge, Work
A) Knowledge B) Data C) Information
A) Data B) Knowledge C) Wisdom
A) Security B) Information C) Data
A) Printed documents B) Random facts C) Processed and analyzed information
A) Data B) Wisdom C) Information
A) security breach B) london bridge C) access
A) data breach B) security breach
A) DDoS B) DoS
A) DoS B) DDoS
A) wire B) badwire C) wiretapping
A) Frontdoor B) Backdoor
A) Privacy B) Anonymity C) Secrecy
A) Secrecy B) Anonymity C) Privacy
A) Privacy B) Anonymity C) Secrecy
A) Tangible assets like buildings, computers, and equipment B) Passwords C) Emails
A) Communications security B) Network security C) Physical security
A) Physical security B) Personal security C) Operations security
A) Operations security B) Communications security C) Personal security
A) Information Security B) Cyersecurity C) Security
A) IPO B) GIGO C) DIKW
A) wisdom tooth B) knowledge C) data
A) Computer security B) Network Security C) Personal security
A) diet pepsi B) kalapastanganan C) data integrity
A) Fabrication B) Modification C) Interception
A) Interception B) Fabrication C) Interruption
A) Fabrication B) Interruption C) Modification
A) Interruption B) Modification C) Fabrication |