System Security Online Quiz
Description: System Security | |
Number of Questions: 30 | |
Created by: Tanuja Atwal | |
Tags: computer science |
Typically, what level of access would a student have in a school on the network?
A caeser cipher uses what for decrpytion?
What must a user have to decrypt a file
What is Encryption?
Identify security Requirements with Passwords below...
These define access permissions for a user
Defines how a system can be secured through specific rules or requirements
Software that performs a barrier between a potential attack and the computer system
A user gaining access to a system or intercepting data without permission would break what law?
Law Enforcement Agencies can intercept data under what law?
An example of a network forensic technique is...
Network Forensics primarily involves...
The official title of the person responsible for exploring and reporting vulnerabilities
Network of computers infected with malware and controlled as a group without owner's knowledge
An SQL injection attack would cause unauthorised access to...
An effect of SQL injection...
Organisations can protect themselves from SQL injections by installing...
Uses a number of systems over a network to bring a website offline
Data Travels across networks in...
Social Engineering, Phishing and Worm are examples of...
Sending requests to a single server using hijacked machines is...
How do hackers use viruses?
What can viruses effect?
How many viruses are made each day?
Trojan Horses...
Worms...
Viruses...
Malware...
Example of a Network Policy
An example of Social Engineering...