Security  Threats 2

Security Threats 2

University

8 Qs

quiz-placeholder

Similar activities

Network and its types

Network and its types

University

10 Qs

Mitigating Threats

Mitigating Threats

University

12 Qs

CLOUD COMPUTING: ACTIVITY 3

CLOUD COMPUTING: ACTIVITY 3

University

10 Qs

Pop Quiz

Pop Quiz

University

10 Qs

Introduction to Computer Science

Introduction to Computer Science

University

10 Qs

CSF Week 2

CSF Week 2

University

10 Qs

CH 12- Defense in Depth

CH 12- Defense in Depth

University

10 Qs

C7_Development Strategies

C7_Development Strategies

University

10 Qs

Security  Threats 2

Security Threats 2

Assessment

Quiz

Computers

University

Medium

Created by

Curtis Forbes

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are reasons why systems are vulnerable t?

accessibility of network

theft of devices

disaster

high prices

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following causes internet vulnerabilities?

Unencrypted VOIP

Faulty hardware

Open network

fix internet addresses

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Eavesdroppers drive by buildings and try to detect S S I D and gain access to network and resources. This refers to

Rogue access points

War driving

Radio Frequency

Sniffing programs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is typically associated with criminal intent?

programmer

cracker

coder

hacker

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security breach may cut into a firm’s market value

true

false

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Name any three types of information systems controls

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

Name two types of plans that are needed to identify a firm's most critical systems?

Evaluate responses using AI:

OFF

8.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these are tools and technologies for sage guarding information systems

two-factor authentication

identity management software

Firewall

Antivirus software

Password systems