Q1-Network Security

Q1-Network Security

10th Grade

12 Qs

quiz-placeholder

Similar activities

Quiz 1.2 Operating system

Quiz 1.2 Operating system

10th Grade

10 Qs

ICT Computer Basics pt1

ICT Computer Basics pt1

10th - 12th Grade

12 Qs

J808 LO1 and LO2 planning project keywords / terms

J808 LO1 and LO2 planning project keywords / terms

9th - 11th Grade

15 Qs

INTERNET AND INTRANET

INTERNET AND INTRANET

9th - 11th Grade

10 Qs

IGCSE ICT - Safety and Security

IGCSE ICT - Safety and Security

10th - 12th Grade

7 Qs

UH 1 BTIK

UH 1 BTIK

10th Grade

15 Qs

Cryptography

Cryptography

6th Grade - University

15 Qs

Ethical and Social Issues in ICT

Ethical and Social Issues in ICT

10th Grade

15 Qs

Q1-Network Security

Q1-Network Security

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Mark Capulong

Used 36+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

attacks that involve penetrating the physical security protecting information systems.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

is a kind of threat involve employees who have access to data, equipment, and the network.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a threat when an employee intends to cause damage to the networking devices of a company.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Is a threat where an employee unintentionally causes damages to data or networking devices/ equipment on the company.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Users outside an organization who do not have authorized access to the network or resources of the company.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a type of attack where the Invaders uses code to access operating systems, networks or software of a company.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers