Search Header Logo

Information Security and Risk

Authored by Karen Haldeman-Clark

Computers, Business

9th - 12th Grade

Used 4+ times

Information Security and Risk
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to Facebook, what is Coordinated Inauthentic Behavior?

Unethical behavior by an individual to change a person's digital footprint.

When groups of pages or people work together to mislead others about who they are or what they’re doing.

When groups of people work together to hack Facebook.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Phonetic Alphabet is_________________.

a way to communicate using only sounds.

pronunciation key for the alphabet.

a set words used by the military and other organizations to communicate letters of the alphabet..

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One function of Information Security is ________.

to protect the data an organization collects and uses.

to make sure organizations sell your information.

to safeguard only the physical assets of a company.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS attack?

A malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic

A malicious attack where hackers target an organization's emails.

A malicious attack on software known as Destroy Defense of Security.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a business asset?

Employee property

Spam

Customer information

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Destruction erases the data so that is completely gone from an organization's database.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Man in the Middle (MITM) attack?

Bypassing sending information to a person in the middle, so they are uninformed.

In cryptography and computer security, an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

Attacking both sides of a data exchange from the middle.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?