Search Header Logo

Security 1.3.22

Authored by Susan Grasso

Specialty

12th Grade

Used 3+ times

Security 1.3.22
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a firewall?

A type of antivirus software

A hardware or software system that controls incoming and outgoing network traffic

A tool for encrypting data

A type of malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hacker?

Someone who writes and tests code

Someone who breaks into computer systems without permission

Someone who builds and maintains computer networks

Someone who designs and sells computer hardware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common type of malware?

Virus

Worm

Trojan

Toaster

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

The act of stealing data from a computer

The act of sending unsolicited emails to large groups of people

The act of trying to trick people into revealing sensitive information online

The act of breaking into a computer system and taking control of it

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a good password?

P@55w0rd

123456

qwerty

Tr0ub4dor&3

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is two-factor authentication?

A security measure that requires a user to provide two different forms of identification before logging in

A security measure that encrypts data in two different ways

A security measure that requires a user to change their password every two weeks

A security measure that requires a user to answer two security questions before logging in

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a denial of service (DoS) attack?

An attack that involves tricking a user into downloading and installing malware

An attack that involves flooding a network or website with traffic in an attempt to make it unavailable to users

An attack that involves stealing data from a computer or network

An attack that involves sending malicious emails to a large number of people

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Specialty