POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

7th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Cyber - Unit 2 Review

Cyber - Unit 2 Review

9th - 12th Grade

20 Qs

PLTW Cybersecurity

PLTW Cybersecurity

9th - 12th Grade

20 Qs

Midterm Review 4

Midterm Review 4

11th Grade

15 Qs

Cybersecurity and Data Privacy Vocabulary

Cybersecurity and Data Privacy Vocabulary

11th Grade - University

15 Qs

The CIA Triad

The CIA Triad

9th Grade

20 Qs

Quiz 1 - Prinsip dan Konsep keamanan informasi

Quiz 1 - Prinsip dan Konsep keamanan informasi

1st Grade - University

17 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

Cybersecurity Security MTA

Cybersecurity Security MTA

9th - 12th Grade

20 Qs

POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

Assessment

Quiz

Computers

7th - 12th Grade

Hard

Created by

Renee Bajor

Used 33+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A guessed password affects which basic principle of a company's security?

Confidentiality

Safety

Availability

Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Windows 7 machine used by the receptionist did not get the latest security patches, and a known vulnerability was exploited. Which business security domain should have addressed this issue?

LAN

Workstation

Server

WAN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following presents a threat to the network>

An unpatched computer.

A computer infected with a root kit.

The sales manager's use of a weak password.

Files are not protected with a password.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The data on a server is encrypted from a ______________ threat. This affects the ________________ principle.

ransomware; confidentiality

worm; availability

ransomware; availability

root kit; integrity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of malware spreads through an open network port.

Trojan horse

Worm

Root kit

Polymorphic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which situation leaves you most vulnerable to malware infections?

Installing purchased software from a DVD.

Surfing the Internet on mobile devices.

Exchanging messages through a social media app.

Using a flash drive on multiple machines.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bug-bounty programs are especially useful against which of the following?

Ransomware attacks

Zero-day vulnerabilities

Keyloggers

Malicious cookies

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?