Security Risks

Security Risks

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

EmTech Q1 Pre-Test 1

EmTech Q1 Pre-Test 1

11th Grade

10 Qs

cyber security Y9

cyber security Y9

9th Grade

10 Qs

BTEC DIT C3 LAB - Internal Threats

BTEC DIT C3 LAB - Internal Threats

10th - 11th Grade

10 Qs

CSP 10-7 Security Risks

CSP 10-7 Security Risks

9th - 11th Grade

8 Qs

AP Computer Science Unit 10

AP Computer Science Unit 10

9th - 12th Grade

12 Qs

AP CSP Unit 8 Review

AP CSP Unit 8 Review

11th Grade

12 Qs

Network Security

Network Security

9th Grade

13 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Security Risks

Security Risks

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Maria Cruz Farooqi

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A wireless access point that gives unauthorized access to secure networks.

Phishing

Virus

Malware

Rogue Access Point

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A program that can copy itself and gain access to a computer in an unauthorized way.

Phishing

Keylogger

Malware

Virus

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Freeware or shareware can be trusted to be free of all malware.

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malicious links can show up in an email message.

True

False

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Use of a program to record every keystroke made by a computer user, in order to gain fraudulent access.

Keylogging

Rogue Access Point

Phishing

Malware

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A technique used to trick a user into providing personal information.

Keylogging

Virus

Phishing

Malware

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Data sent over public networks can be intercepted, analyzed and modified. One way this can happen is through...

Rogue Access Point

Keylogging

Phishing

Permissions

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Unsolicited emails, attachments, and links in emails can not be used to compromise the security of a computing system.

True

False