Cyber Security Training ICICI

Shorty Quiz 01

Total 5 Points

Start Quiz

Which of the following defines Vulnerability the best?

A protective measure

A weakness in the system

A potential negative harmful occurrence 

None of the Above

Fabrication of data affects which aspect of information security?

Confidentiality

Integrity

Availability

Which of the following method is used to store passwords securely in database servers?

Encoding

Encryption

Hashing

Obfuscation

Which of the below listed item are not phishing attack?

Whaling

Spear Phishing

PreTexing

Shoulder Surfing

The mandatory process used to verify the identity of the user and restrict illegitimate users to access the system is called as_______

Authentication

Authorization

Auditing

None of the Above

Quiz/Test Summary
Title: Cyber Security Training ICICI
Questions: 5
Contributed by: