Network Security Threats Quiz

Network Security Threats Quiz

10th Grade

13 Qs

quiz-placeholder

Similar activities

U1 Digital Information Vocab

U1 Digital Information Vocab

9th - 12th Grade

12 Qs

OCR Computer Science 1.2.1

OCR Computer Science 1.2.1

9th - 11th Grade

16 Qs

WJEC GCSE Computer Science - Security

WJEC GCSE Computer Science - Security

9th - 10th Grade

18 Qs

NETWORK DEVICES

NETWORK DEVICES

9th - 11th Grade

10 Qs

Intro to Databases in Access

Intro to Databases in Access

9th - 11th Grade

16 Qs

Computer Components

Computer Components

7th - 11th Grade

13 Qs

BTEC DIT C3 LAB - Device Hardening & Encryption

BTEC DIT C3 LAB - Device Hardening & Encryption

10th - 11th Grade

10 Qs

BTEC DIT C3 LAB - User Access Restriction

BTEC DIT C3 LAB - User Access Restriction

10th - 11th Grade

10 Qs

Network Security Threats Quiz

Network Security Threats Quiz

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Sarika Sankarankutty

Used 22+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the potential effects of malware on a computer?

Files may be deleted or corrupted

Computers may crash or slow down

Keys pressed on the keyboard may be recorded

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can a hacker do if they successfully phish someone?

Withdraw money or make purchases

Open new bank or credit card accounts

Access high-value corporate data

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the consequences of a brute-force attack?

Potential data theft and access to sensitive information

Loss of revenue due to server downtime

Productivity loss for the workforce

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can happen during a denial-of-service attack?

Loss of revenue and profits

Productivity loss for the workforce

Reputation damage to the company

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can data interception lead to unauthorized access?

Compromising usernames and passwords

Listening to data transferred on the network

Accessing systems in a legitimate way

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can be achieved through SQL injection hacks?

Outputting hidden data from the database

Amending or deleting database contents

Adding rogue records and entries to the database

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some examples of system vulnerabilities caused by people?

Not installing operating system updates

Not keeping anti-malware software up-to-date

Leaving printouts with sensitive information

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?