
Information Security and Risk
Quiz
•
Computers, Business
•
9th - 12th Grade
•
Medium

Karen Haldeman-Clark
Used 4+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to Facebook, what is Coordinated Inauthentic Behavior?
Unethical behavior by an individual to change a person's digital footprint.
When groups of pages or people work together to mislead others about who they are or what they’re doing.
When groups of people work together to hack Facebook.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Phonetic Alphabet is_________________.
a way to communicate using only sounds.
pronunciation key for the alphabet.
a set words used by the military and other organizations to communicate letters of the alphabet..
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
One function of Information Security is ________.
to protect the data an organization collects and uses.
to make sure organizations sell your information.
to safeguard only the physical assets of a company.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a DDoS attack?
A malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
A malicious attack where hackers target an organization's emails.
A malicious attack on software known as Destroy Defense of Security.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a business asset?
Employee property
Spam
Customer information
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Data Destruction erases the data so that is completely gone from an organization's database.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Man in the Middle (MITM) attack?
Bypassing sending information to a person in the middle, so they are uninformed.
In cryptography and computer security, an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
Attacking both sides of a data exchange from the middle.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
0 questions
Threats & Vulnerabilities
Quiz
•
0 questions
Cyber Mid-Term Review 2019
Quiz
•
0 questions
COMPTIA Review Units 1-6 Practice Exam
Quiz
•
0 questions
Digital Communication Behavior Quiz
Quiz
•
0 questions
Cybersecurity Quiz
Quiz
•
0 questions
Itech Quiz
Quiz
•
0 questions
Module 5 Test Review - Cengage Mindtap
Quiz
•
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
