Quiz on Vulnerability and risk management
Created By Sunita Nain
Sign in to Google to save your progress. Learn more
Trainee Nam *
Father Name *
Roll No. *
Trade *
ITI Name *
1. Potential weaknesses in IT infra structure through which a cyber attack might occur is called .---------
1 point
Clear selection
2. Vulnerability for cyber attack may be in----------
1 point
Clear selection
3. To protect the network infra structure from vulnerability, -------------is setup.
1 point
Clear selection
4. The person using vulnerability in operating system or application software or ITinfrastructure to intrude in to the computer of a victim is called .
1 point
Clear selection
5. Periodic assessment of security vulnerability in computer systems is called--------audit.
1 point
Clear selection
6. Maintaining computers free from cyberattack is called-----------
1 point
Clear selection
7. The security audit team---------- to keep the computers safe from cyber attacks
1 point
Clear selection
8. To ensure information safety,-----------should be implemented.
1 point
Clear selection
9. Protecting access to a computer through-----------is called access control.
1 point
Clear selection
10. A single point of access for several networking services is called .
1 point
Clear selection
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy