
Network Security Quiz

Quiz
•
Other
•
12th Grade
•
Hard
K Scott
FREE Resource
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
Software written to infect computers and commit crimes
A trial-and-error method used to decode encrypted data
Flooding a server with useless traffic
Monitoring a data stream to gather sensitive information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
A code injection technique used to attack data-driven applications
Software written to infect computers and commit crimes
Flooding a server with useless traffic
An online fraud technique used to entice you to disclose personal information
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are brute-force attacks?
A trial-and-error method used to decode encrypted data
Monitoring a data stream to gather sensitive information
Flooding a server with useless traffic
Software written to infect computers and commit crimes
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a denial-of-service attack?
Monitoring a data stream to gather sensitive information
Flooding a server with useless traffic
An online fraud technique used to entice you to disclose personal information
A code injection technique used to attack data-driven applications
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is data interception and theft?
Monitoring a data stream to gather sensitive information
Software written to infect computers and commit crimes
A trial-and-error method used to decode encrypted data
Flooding a server with useless traffic
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is SQL injection?
Monitoring a data stream to gather sensitive information
A code injection technique used to attack data-driven applications
Flooding a server with useless traffic
Software written to infect computers and commit crimes
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which form of attack involves infecting computers with trojans?
Malware
Phishing
Brute-force attacks
Data interception and theft
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which form of attack involves tricking users into providing personal information?
Malware
Phishing
Brute-force attacks
Data interception and theft
9.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which form of attack involves flooding a server with useless traffic?
Malware
Phishing
Brute-force attacks
Data interception and theft
Similar Resources on Wayground
10 questions
Proxy Server

Quiz
•
12th Grade
10 questions
March 19-20 Assessment Review

Quiz
•
9th - 12th Grade
10 questions
Network Concepts

Quiz
•
9th - 12th Grade
10 questions
Firewall

Quiz
•
12th Grade
5 questions
asessmen awal kd. 3.12 Mengevaluasi VPS

Quiz
•
12th Grade
7 questions
APIs and Libraries Quizizz Practice

Quiz
•
12th Grade
12 questions
E-Rapor-1

Quiz
•
12th Grade
10 questions
kuis Load Balancing

Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Hersheys' Travels Quiz (AM)

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
30 questions
Lufkin Road Middle School Student Handbook & Policies Assessment

Quiz
•
7th Grade
20 questions
Multiplication Facts

Quiz
•
3rd Grade
17 questions
MIXED Factoring Review

Quiz
•
KG - University
10 questions
Laws of Exponents

Quiz
•
9th Grade
10 questions
Characterization

Quiz
•
3rd - 7th Grade
10 questions
Multiply Fractions

Quiz
•
6th Grade