Protecting Information Resources

Protecting Information Resources

Professional Development

30 Qs

quiz-placeholder

Similar activities

Aparell digestiu (Fisiologia)

Aparell digestiu (Fisiologia)

Professional Development

25 Qs

SERBA SERBI YAMAHA

SERBA SERBI YAMAHA

Professional Development

25 Qs

Mengenal MTsN 8 Jakarta

Mengenal MTsN 8 Jakarta

Professional Development

25 Qs

Conversatorio Tecnología Gráfica 3

Conversatorio Tecnología Gráfica 3

University - Professional Development

25 Qs

Histologia: TÉCNICAS HISTOLÓGICAS, TEJIDO EPITELIAL Y CONECTIVO

Histologia: TÉCNICAS HISTOLÓGICAS, TEJIDO EPITELIAL Y CONECTIVO

University - Professional Development

25 Qs

Finance 2.0 Integration Awareness

Finance 2.0 Integration Awareness

Professional Development

25 Qs

Induction Quiz

Induction Quiz

Professional Development

25 Qs

FAFD2

FAFD2

Professional Development

25 Qs

Protecting Information Resources

Protecting Information Resources

Assessment

Quiz

Professional Development, Instructional Technology

Professional Development

Practice Problem

Hard

Created by

Giovani Ten

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ____ is the least experienced type of hacker.

script kiddie

black hat

white hat

wizard

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack by a ____ hacker might not be an actual threat to an organization’s security system

script kiddie

black hat

white hat

wizard

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The McCumber cube defines ____ characteristics of information security.

three

six

nine

twelve

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Level 1 security involves ____.

back-end systems

corporate networks

physical security

front-end servers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A backup power unit is also called a ____.

UPS

McCumber device

level 1 protective device

RAID

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Intentional threats include ____.

floods

user’s accidental deletion of data

attacks by disgruntled employees

power outages

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to Symantec Corporation, in 2008 the number of computer viruses in existence exceeded one ____.

hundred thousand

half million

million

trillion

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?