Information Security and Risk

Information Security and Risk

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Threats & Vulnerabilities

Threats & Vulnerabilities

Cyber Mid-Term Review 2019

Cyber Mid-Term Review 2019

COMPTIA Review Units 1-6 Practice Exam

COMPTIA Review Units 1-6 Practice Exam

Digital Communication Behavior Quiz

Digital Communication Behavior Quiz

Cybersecurity Quiz

Cybersecurity Quiz

Itech Quiz

Itech Quiz

Module 5 Test Review - Cengage Mindtap

Module 5 Test Review - Cengage Mindtap

Information Security and Risk

Information Security and Risk

Assessment

Quiz

Computers, Business

9th - 12th Grade

Medium

Created by

Karen Haldeman-Clark

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to Facebook, what is Coordinated Inauthentic Behavior?

Unethical behavior by an individual to change a person's digital footprint.

When groups of pages or people work together to mislead others about who they are or what they’re doing.

When groups of people work together to hack Facebook.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Phonetic Alphabet is_________________.

a way to communicate using only sounds.

pronunciation key for the alphabet.

a set words used by the military and other organizations to communicate letters of the alphabet..

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One function of Information Security is ________.

to protect the data an organization collects and uses.

to make sure organizations sell your information.

to safeguard only the physical assets of a company.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS attack?

A malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic

A malicious attack where hackers target an organization's emails.

A malicious attack on software known as Destroy Defense of Security.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a business asset?

Employee property

Spam

Customer information

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Destruction erases the data so that is completely gone from an organization's database.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Man in the Middle (MITM) attack?

Bypassing sending information to a person in the middle, so they are uninformed.

In cryptography and computer security, an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

Attacking both sides of a data exchange from the middle.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?