Study VI Security

Study VI Security

12th Grade

20 Qs

quiz-placeholder

Similar activities

The Wild Wild Internet

The Wild Wild Internet

7th - 12th Grade

15 Qs

Computer viruses

Computer viruses

KG - University

16 Qs

Boot Camp Mobility and Devices

Boot Camp Mobility and Devices

9th - 12th Grade

20 Qs

Computer Technology

Computer Technology

9th - 12th Grade

20 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Test Your Knowledge Google Drive

Test Your Knowledge Google Drive

9th Grade - University

20 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

TestOut ITF Chapter 5 Part 1

TestOut ITF Chapter 5 Part 1

9th - 12th Grade

15 Qs

Study VI Security

Study VI Security

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Meredith Watkins

Used 52+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are activities that a hacker might attempt?

Stealing usernames and passwords

Modifying website content

Disrupting network communications

Analyzing network traffic

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have invented a new toy that will be the most popular toy for

children this year. What type of intellectual property protection

should you get?

Trademark

Copyright

Patent

Receipt

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are threats to data availability? (Choose

two.)

Service outage

Replay attack

Wiretapping

Destruction

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of an application that appears to look like a

helpful application but instead does harm to your computer?

Virus

Worm

Malware

Trojan horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone was recently caught sifting through your company’s trash

looking for confidential information. What is this an example of?

Trash snooping

Dumpster diving

Phishing

Social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are implementing multifactor security on a computer. Which

of the following is not a valid factor?

Receipt

Password

Hardware token

Specific location

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You have been asked to lead a class on preventing social

engineering. What two topics should you be sure to cover? (Choose

two.)

Viruses and worms

Shoulder surfing

Hardware theft

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?