Network Security Threats Quiz

Network Security Threats Quiz

10th Grade

13 Qs

quiz-placeholder

Similar activities

Internet Security

Internet Security

9th - 11th Grade

10 Qs

File tab

File tab

9th - 12th Grade

10 Qs

Computer Misuse Act

Computer Misuse Act

10th - 12th Grade

12 Qs

BTEC DIT C3 LAA - Technology for Teams

BTEC DIT C3 LAA - Technology for Teams

10th - 11th Grade

10 Qs

I.C.T. 10

I.C.T. 10

10th Grade

15 Qs

[Period 7] CPU & Motherboard

[Period 7] CPU & Motherboard

9th Grade - University

11 Qs

Basic Website Development Quiz

Basic Website Development Quiz

9th - 12th Grade

15 Qs

PowerPoint Essentials

PowerPoint Essentials

9th - 12th Grade

11 Qs

Network Security Threats Quiz

Network Security Threats Quiz

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Sarika Sankarankutty

Used 22+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the potential effects of malware on a computer?

Files may be deleted or corrupted

Computers may crash or slow down

Keys pressed on the keyboard may be recorded

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can a hacker do if they successfully phish someone?

Withdraw money or make purchases

Open new bank or credit card accounts

Access high-value corporate data

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the consequences of a brute-force attack?

Potential data theft and access to sensitive information

Loss of revenue due to server downtime

Productivity loss for the workforce

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can happen during a denial-of-service attack?

Loss of revenue and profits

Productivity loss for the workforce

Reputation damage to the company

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can data interception lead to unauthorized access?

Compromising usernames and passwords

Listening to data transferred on the network

Accessing systems in a legitimate way

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can be achieved through SQL injection hacks?

Outputting hidden data from the database

Amending or deleting database contents

Adding rogue records and entries to the database

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some examples of system vulnerabilities caused by people?

Not installing operating system updates

Not keeping anti-malware software up-to-date

Leaving printouts with sensitive information

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?