Network Security Quiz

Network Security Quiz

12th Grade

9 Qs

quiz-placeholder

Similar activities

Firewall

Firewall

12th Grade

10 Qs

asessmen awal kd. 3.12 Mengevaluasi VPS

asessmen awal kd. 3.12 Mengevaluasi VPS

12th Grade

5 Qs

Vehicle Traffic Stops

Vehicle Traffic Stops

10th - 12th Grade

9 Qs

kuis Load Balancing

kuis Load Balancing

12th Grade

10 Qs

Communication & Networking - Client Server & Peer to Peer

Communication & Networking - Client Server & Peer to Peer

2nd - 12th Grade

10 Qs

Proxy Server

Proxy Server

12th Grade

10 Qs

Internet Protocols

Internet Protocols

12th Grade

11 Qs

March 19-20 Assessment Review

March 19-20 Assessment Review

9th - 12th Grade

10 Qs

Network Security Quiz

Network Security Quiz

Assessment

Quiz

Other

12th Grade

Hard

Created by

K Scott

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Software written to infect computers and commit crimes

A trial-and-error method used to decode encrypted data

Flooding a server with useless traffic

Monitoring a data stream to gather sensitive information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A code injection technique used to attack data-driven applications

Software written to infect computers and commit crimes

Flooding a server with useless traffic

An online fraud technique used to entice you to disclose personal information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are brute-force attacks?

A trial-and-error method used to decode encrypted data

Monitoring a data stream to gather sensitive information

Flooding a server with useless traffic

Software written to infect computers and commit crimes

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a denial-of-service attack?

Monitoring a data stream to gather sensitive information

Flooding a server with useless traffic

An online fraud technique used to entice you to disclose personal information

A code injection technique used to attack data-driven applications

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data interception and theft?

Monitoring a data stream to gather sensitive information

Software written to infect computers and commit crimes

A trial-and-error method used to decode encrypted data

Flooding a server with useless traffic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is SQL injection?

Monitoring a data stream to gather sensitive information

A code injection technique used to attack data-driven applications

Flooding a server with useless traffic

Software written to infect computers and commit crimes

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of attack involves infecting computers with trojans?

Malware

Phishing

Brute-force attacks

Data interception and theft

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of attack involves tricking users into providing personal information?

Malware

Phishing

Brute-force attacks

Data interception and theft

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of attack involves flooding a server with useless traffic?

Malware

Phishing

Brute-force attacks

Data interception and theft