IS4 PM_2025 – Telegram
IS4 PM_2025
736 subscribers
724 photos
47 videos
1.15K files
308 links
Download Telegram
In most cases integrity is enforced through
Anonymous Quiz
48%
Physical security
10%
Logical security
12%
Confidentiality
30%
Access control
👍1
After an attacker has probed a network for information the next step is to
Anonymous Quiz
68%
Penetrate any defense
17%
Circumstances are required
11%
He is wonderful
5%
None
👍1
In which category does compromising confidential information fall?
Anonymous Quiz
50%
Threat
13%
Bug
11%
Russi is great
26%
Attack
Which software is mainly used to detect viruses and avoid them
Anonymous Quiz
5%
Antinal
9%
Anticipate
8%
Anthony
78%
Anti-virus
🤣2
A reply attack is to punch the attacker's face
Anonymous Quiz
30%
True
70%
False
A reply attack makes it awesome
Anonymous Quiz
42%
True
58%
False
👍1
A replay attack replays the attack until the server is dead
Anonymous Quiz
51%
True
49%
False
🤣4
Computer security is protection of the integrity availability and confidentiality of information system resources
Anonymous Quiz
94%
T
6%
F
Malicious software can be used to trick users into revealing sensitive personal data
Anonymous Quiz
89%
T
11%
F
Spyware is a general term used for describing software that gathers information without user's consent
Anonymous Quiz
88%
T
12%
F
The best hackers in the world are in Russia
Anonymous Quiz
72%
True
28%
False
phishing means diving in the sea
Anonymous Quiz
37%
True
63%
False
Conventional cryptography also known as asymmetric encryption ?
Anonymous Quiz
56%
True
44%
False
Phishing is a form of spamming
Anonymous Quiz
93%
True
7%
False
Keylogging is a form of Spyware
Anonymous Quiz
88%
True
12%
False
👍1
Authorized parties can view information
Anonymous Quiz
71%
Confidentiality
17%
Integrity
9%
Scalability
3%
None
To remove a root kit you have to reformat your computer
Anonymous Quiz
86%
True
14%
False
Using additive Caesar cipher with key=10 to encrypt "hello" we get "ROVVY"
Anonymous Quiz
85%
True
15%
False
Cryptography is the science and art of transforming messages to make them secure ammune to attack
Anonymous Quiz
90%
True
10%
False