Security  Threats 2

Security Threats 2

University

8 Qs

quiz-placeholder

Similar activities

Intrusion Detection System - Quiz

Intrusion Detection System - Quiz

University

10 Qs

computer Networks

computer Networks

University

10 Qs

Basic Networking

Basic Networking

University

10 Qs

System Administration V

System Administration V

University

10 Qs

Information Technology

Information Technology

University

10 Qs

Unit 2 - Theme 1 - NWEG5122

Unit 2 - Theme 1 - NWEG5122

University

8 Qs

Computer Networks

Computer Networks

University

10 Qs

CompTIA Network+ N10-008 Chapter 13

CompTIA Network+ N10-008 Chapter 13

University

13 Qs

Security  Threats 2

Security Threats 2

Assessment

Quiz

Computers

University

Medium

Created by

Curtis Forbes

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are reasons why systems are vulnerable t?

accessibility of network

theft of devices

disaster

high prices

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following causes internet vulnerabilities?

Unencrypted VOIP

Faulty hardware

Open network

fix internet addresses

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Eavesdroppers drive by buildings and try to detect S S I D and gain access to network and resources. This refers to

Rogue access points

War driving

Radio Frequency

Sniffing programs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is typically associated with criminal intent?

programmer

cracker

coder

hacker

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security breach may cut into a firm’s market value

true

false

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Name any three types of information systems controls

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

Name two types of plans that are needed to identify a firm's most critical systems?

Evaluate responses using AI:

OFF

8.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these are tools and technologies for sage guarding information systems

two-factor authentication

identity management software

Firewall

Antivirus software

Password systems