Search Header Logo

QUIZ FOR MY ADI

Authored by Rose Quintana

others

University

Used 12+ times

QUIZ FOR MY ADI
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is an example of identifying individual user profiles on social networking sites.

Data Encryption

Online

Privacy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How to avoid eavesdropping on network traffic while working on a computer on a public Wi-Fi access point?

Connect with a VPN service

Turn off your wifi

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is another term for confidential information of every individual?

Data Encryption

Privacy

Security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Characteristics that describes worm.hides

to create a strong and effective password.

discovering weaknesses of networks and systems to improve the security level of these systems

it travels to new computers without any intervention or knowledge of the user

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What method can be used to ensure confidentiality of information?

Data Encryption

Privacy Method

Security Method

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

This attack disrupts services by overwhelming network devices with bogus traffic

Distributed Denial-Of-Service

Privacy Attack

Pishing Attack

Malware Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a component that belongs to the CIA triad?

Information

Security

Confidentiality

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?