
Protecting Information Resources
Authored by Giovani Ten
Professional Development, Instructional Technology
Professional Development
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ____ is the least experienced type of hacker.
script kiddie
black hat
white hat
wizard
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attack by a ____ hacker might not be an actual threat to an organization’s security system
script kiddie
black hat
white hat
wizard
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The McCumber cube defines ____ characteristics of information security.
three
six
nine
twelve
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Level 1 security involves ____.
back-end systems
corporate networks
physical security
front-end servers
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A backup power unit is also called a ____.
UPS
McCumber device
level 1 protective device
RAID
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Intentional threats include ____.
floods
user’s accidental deletion of data
attacks by disgruntled employees
power outages
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to Symantec Corporation, in 2008 the number of computer viruses in existence exceeded one ____.
hundred thousand
half million
million
trillion
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?