
Information Security and Risk
Authored by Karen Haldeman-Clark
Computers, Business
9th - 12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to Facebook, what is Coordinated Inauthentic Behavior?
Unethical behavior by an individual to change a person's digital footprint.
When groups of pages or people work together to mislead others about who they are or what they’re doing.
When groups of people work together to hack Facebook.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Phonetic Alphabet is_________________.
a way to communicate using only sounds.
pronunciation key for the alphabet.
a set words used by the military and other organizations to communicate letters of the alphabet..
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
One function of Information Security is ________.
to protect the data an organization collects and uses.
to make sure organizations sell your information.
to safeguard only the physical assets of a company.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a DDoS attack?
A malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
A malicious attack where hackers target an organization's emails.
A malicious attack on software known as Destroy Defense of Security.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a business asset?
Employee property
Spam
Customer information
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Data Destruction erases the data so that is completely gone from an organization's database.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Man in the Middle (MITM) attack?
Bypassing sending information to a person in the middle, so they are uninformed.
In cryptography and computer security, an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
Attacking both sides of a data exchange from the middle.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
REMEDI PAS - DESAIN DAN KOMP. GRAFIS
Quiz
•
12th Grade
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
20 questions
Edexcel Business - Grade 9
Quiz
•
9th Grade
20 questions
Pengetahuan Dasar Komputer
Quiz
•
9th - 12th Grade
15 questions
US PKK XI 1 TBSM
Quiz
•
11th Grade
20 questions
Evaluación Primer Periodo Excel
Quiz
•
10th Grade
15 questions
PRUEBA CORTA I - SISTEMA E INSTALACIÓN DE SOFTWARE I - U4
Quiz
•
9th - 12th Grade
19 questions
UNIT 1.2 MEMORY
Quiz
•
10th Grade
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade