IS4 PM_2025 – Telegram
IS4 PM_2025
736 subscribers
724 photos
47 videos
1.15K files
308 links
Download Telegram
Malicious software can be used to trick users into revealing sensitive personal data
Anonymous Quiz
89%
T
11%
F
Spyware is a general term used for describing software that gathers information without user's consent
Anonymous Quiz
88%
T
12%
F
The best hackers in the world are in Russia
Anonymous Quiz
72%
True
28%
False
phishing means diving in the sea
Anonymous Quiz
37%
True
63%
False
Conventional cryptography also known as asymmetric encryption ?
Anonymous Quiz
56%
True
44%
False
Phishing is a form of spamming
Anonymous Quiz
93%
True
7%
False
Keylogging is a form of Spyware
Anonymous Quiz
88%
True
12%
False
👍1
Authorized parties can view information
Anonymous Quiz
71%
Confidentiality
17%
Integrity
9%
Scalability
3%
None
To remove a root kit you have to reformat your computer
Anonymous Quiz
86%
True
14%
False
Using additive Caesar cipher with key=10 to encrypt "hello" we get "ROVVY"
Anonymous Quiz
85%
True
15%
False
Cryptography is the science and art of transforming messages to make them secure ammune to attack
Anonymous Quiz
90%
True
10%
False
a replay attack makes a copy of the transmission for use at a later time
Anonymous Quiz
98%
True
2%
False
threat agent is a person or thing that has the power to carry out a threat
Anonymous Quiz
89%
True
11%
False
private key in asymmetric key cryptographic is kept by receiver
Anonymous Quiz
93%
True
7%
False
Virus requires a user to transport it from one computer to another
Anonymous Quiz
93%
True
7%
False
threat is a potential danger to information or system
Anonymous Quiz
93%
True
7%
False
Push flood is not a DOS attack
Anonymous Quiz
70%
True
30%
False
Firewall are used to protect against unauthorized access
Anonymous Quiz
91%
True
9%
False
Conventional cryptography also known as Asymmetric encryption
Anonymous Quiz
71%
True
29%
False
A private key in Asymmetric key cryptography is kept by receiver
Anonymous Quiz
92%
True
8%
False
A private key in Asymmetric key cryptography is kept by sender
Anonymous Quiz
34%
True
66%
False