Network Security Threats Quiz

Network Security Threats Quiz

10th Grade

13 Qs

quiz-placeholder

Similar activities

Python Basics - yr 9

Python Basics - yr 9

9th - 12th Grade

18 Qs

1.4 Wired and Wireless Networks

1.4 Wired and Wireless Networks

10th - 11th Grade

13 Qs

File Organization

File Organization

10th Grade

17 Qs

Security Systems - Threats

Security Systems - Threats

10th Grade

14 Qs

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

Computer Basics

Computer Basics

KG - University

16 Qs

Cyber Security

Cyber Security

9th - 12th Grade

15 Qs

Network Hardware

Network Hardware

10th Grade

16 Qs

Network Security Threats Quiz

Network Security Threats Quiz

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Sarika Sankarankutty

Used 22+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the potential effects of malware on a computer?

Files may be deleted or corrupted

Computers may crash or slow down

Keys pressed on the keyboard may be recorded

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can a hacker do if they successfully phish someone?

Withdraw money or make purchases

Open new bank or credit card accounts

Access high-value corporate data

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the consequences of a brute-force attack?

Potential data theft and access to sensitive information

Loss of revenue due to server downtime

Productivity loss for the workforce

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can happen during a denial-of-service attack?

Loss of revenue and profits

Productivity loss for the workforce

Reputation damage to the company

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can data interception lead to unauthorized access?

Compromising usernames and passwords

Listening to data transferred on the network

Accessing systems in a legitimate way

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can be achieved through SQL injection hacks?

Outputting hidden data from the database

Amending or deleting database contents

Adding rogue records and entries to the database

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some examples of system vulnerabilities caused by people?

Not installing operating system updates

Not keeping anti-malware software up-to-date

Leaving printouts with sensitive information

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?