Search Header Logo

Security Threats 2

Authored by Curtis Forbes

Computers

University

Used 6+ times

Security  Threats 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are reasons why systems are vulnerable t?

accessibility of network

theft of devices

disaster

high prices

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following causes internet vulnerabilities?

Unencrypted VOIP

Faulty hardware

Open network

fix internet addresses

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Eavesdroppers drive by buildings and try to detect S S I D and gain access to network and resources. This refers to

Rogue access points

War driving

Radio Frequency

Sniffing programs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is typically associated with criminal intent?

programmer

cracker

coder

hacker

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security breach may cut into a firm’s market value

true

false

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Name any three types of information systems controls

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

Name two types of plans that are needed to identify a firm's most critical systems?

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?