MIT-FIN

MIT-FIN

Assessment

Quiz

Instructional Technology

5th Grade

Practice Problem

Medium

Created by

Seth Sarmiento

Used 9+ times

FREE Resource

Student preview

quiz-placeholder

70 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

1. It is commonly known as the unauthorized access from a Third party user or application.

Hacking

Cyber Attack

Illegal access

Exploiting

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

2. It involves a techniques that help in securing various components of networks, data and computer system.

Cyber Attack

Cyber Crime

Cyber Security

Hacking

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

3. It is the person who carries out a Cyber attack.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

4. This type of attack have to download any suspicious attachments online installed on the system that could have gotten corrupted by certain malicious viruses.

Malware Attack

Phishing Attack

Man-in-the-middle Attack

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

5. It is a type of cyber attack which an experienced hacker usually sends fraudulent emails which appear to be coming from a legitimate source, this is done to install malware or to steal sensitive data like credit card information and login credentials.

Malware Attack

Phishing attack

Man-in-the-middle Attack

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

6. It is a type of attack where the hacker gains access to the information path between any device and the websites

server. The hackers computer takes over an IP address, by doing so the communication line between the device and the

website is secretly intercepted. This commonly happens with unsecured Wi-Fi networks.

Malware Attacks

Man-in-the-middle Attack

Phishing Attack

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

7. It serves as a filter the incoming and outgoing traffic from your device to safeguard your network and they can either be software applications or Hardware reinforcements.

SMTP

Security protocols

Filtered data

Internet firewalls

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology