Study VI Security

Study VI Security

12th Grade

20 Qs

quiz-placeholder

Similar activities

Google

Google

7th - 12th Grade

20 Qs

TMK TAHUN 5 2018(MODUL 1/ UNIT 1)

TMK TAHUN 5 2018(MODUL 1/ UNIT 1)

10th - 12th Grade

20 Qs

SciVis II 4 D

SciVis II 4 D

9th - 12th Grade

16 Qs

quiz_G10

quiz_G10

12th Grade

20 Qs

Quiz1_12&11_2t_20214

Quiz1_12&11_2t_20214

12th Grade

20 Qs

Quiz 01 Keamanan Jaringan

Quiz 01 Keamanan Jaringan

12th Grade

17 Qs

Ap computer science a

Ap computer science a

1st - 12th Grade

15 Qs

Study VI Security

Study VI Security

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Meredith Watkins

Used 61+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are activities that a hacker might attempt?

Stealing usernames and passwords

Modifying website content

Disrupting network communications

Analyzing network traffic

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have invented a new toy that will be the most popular toy for

children this year. What type of intellectual property protection

should you get?

Trademark

Copyright

Patent

Receipt

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are threats to data availability? (Choose

two.)

Service outage

Replay attack

Wiretapping

Destruction

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of an application that appears to look like a

helpful application but instead does harm to your computer?

Virus

Worm

Malware

Trojan horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone was recently caught sifting through your company’s trash

looking for confidential information. What is this an example of?

Trash snooping

Dumpster diving

Phishing

Social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are implementing multifactor security on a computer. Which

of the following is not a valid factor?

Receipt

Password

Hardware token

Specific location

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You have been asked to lead a class on preventing social

engineering. What two topics should you be sure to cover? (Choose

two.)

Viruses and worms

Shoulder surfing

Hardware theft

Phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?