A) A software update B) Unauthorized access to protected systems and data C) Changing password
A) Firewall B) Virus C) Password manager
A) Encryption B) Social engineering C) Firewall setup
A) Steals passwords directly B) Installs antivirus C) Sends too many requests to make a website unavailable
A) DDoS is smaller than DoS B) DoS uses one attacker; DDoS uses multiple attackers C) No difference
A) Backing up files B) Using strong passwords C) Clicking unknown links
A) A system update B) Someone who protects systems C) Someone who attempts to compromise security
A) A software program B) A security guard C) Someone who gains unauthorized access
A) Only illegal B) A person skilled in computers and networks C) Always malicious
A) Black Hat B) Gray Hat C) White Hat
A) White Hat B) Black Hat C) Gray Hat
A) White Hat B) Gray Hat C) Black Hat
A) Government agent B) Malicious hacker C) Ethical hacker
A) Malicious hacker B) Criminal hacker C) Ethical hacker
A) Secretly monitoring communications B) Encrypting files C) Updating software
A) Instant messages B) Smartphones C) All of the above
A) Encrypts data for secure communication B) Removes ads C) Makes internet faster
A) Unknown sounds during calls B) Clear signal C) Normal battery use
A) Hacking passwords to gain unauthorized access B) Creating strong passwords C) Changing passwords regularly
A) Data B) Wisdom C) Information
A) Processed and analyzed information B) Raw facts C) Stored files
A) Information B) Knowledge C) Wisdom
A) Authorized users B) The public C) Everyone
A) Utility B) Accuracy C) Possession
A) Authenticity B) Availability C) Confidentiality
A) Utility B) Integrity C) Privacy
A) Accuracy B) Utility
A) Possession B) Availability C) Confidentiality
A) Data, Info, Wisdom B) DoS, DDoS, MITM C) CIA (Confidentiality, Integrity, Availability)
A) Authenticity B) Availability C) Integrity
A) Integrity B) Confidentiality C) Possession
A) Firewall B) Encryption method C) Malware
A) Alan Turing B) Julius Caesar C) Rhanaeyra Targaryen
A) Physical security B) Operations security C) Network security
A) Physical security B) Communications security C) Network security
A) An intruder gains unauthorized access B) You update software C) You change password
A) Firewall B) Backup C) Malware
A) Encrypting files B) Updating antivirus C) Disguising as a legitimate organization
A) Dracarys B) Rhanaeyra Targaryen C) Caesar cipher
A) Julius Caesar B) Daenerys Targaryen C) Allicent HightTower
A) computer security B) information assurance
A) computer security B) information assurance
A) security B) assurance
A) Data, Information, Knowledge, Wisdom B) Data, Integrity, Knowledge, Work C) Digital, Information, Key, World
A) Information B) Knowledge C) Data
A) Data B) Knowledge C) Wisdom
A) Security B) Data C) Information
A) Processed and analyzed information B) Random facts C) Printed documents
A) Information B) Wisdom C) Data
A) access B) security breach C) london bridge
A) data breach B) security breach
A) DDoS B) DoS
A) DDoS B) DoS
A) wire B) badwire C) wiretapping
A) Backdoor B) Frontdoor
A) Anonymity B) Secrecy C) Privacy
A) Privacy B) Secrecy C) Anonymity
A) Anonymity B) Privacy C) Secrecy
A) Emails B) Passwords C) Tangible assets like buildings, computers, and equipment
A) Physical security B) Communications security C) Network security
A) Personal security B) Physical security C) Operations security
A) Communications security B) Operations security C) Personal security
A) Cyersecurity B) Security C) Information Security
A) GIGO B) DIKW C) IPO
A) knowledge B) wisdom tooth C) data
A) Network Security B) Computer security C) Personal security
A) data integrity B) diet pepsi C) kalapastanganan
A) Fabrication B) Interception C) Modification
A) Interception B) Fabrication C) Interruption
A) Modification B) Interruption C) Fabrication
A) Interruption B) Modification C) Fabrication |