NETESS 2.0 MODULE 15 QUIZ - Security Threats

Quiz
•
Computers
•
12th Grade
•
Hard

Ereck Ladd
FREE Resource
33 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Sending a virus that will format the hard drive of a computer is an example of data loss or manipulation threat.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Using stolen credit or identity information to make illegal online purchases is an example of identity theft.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor prevents legal users from accessing data services?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Disruption of service attacks occur when legitimate users are prevented from accessing data and services.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor steals scientific research data?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Stealing research data or proprietary information is an example of information theft.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor overloads a network to deny other users network access?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Disruption of service attacks occur when legitimate users are prevented from accessing data and services or the network.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor alters data records?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Altering data records is an example of data loss or manipulation.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor is stealing the user database of a company?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Stealing data records or proprietary information is an example of information theft.
Create a free account and access millions of resources
Similar Resources on Wayground
32 questions
Studio - U3 - LO4-4.2 Cyber Security Incident report

Quiz
•
12th Grade
35 questions
Wireless Network Review

Quiz
•
11th Grade - University
30 questions
Unit 3 Project Management

Quiz
•
11th Grade - University
37 questions
Cyber 1 - NG

Quiz
•
6th Grade - University
32 questions
WARMING UP - PPL PAT 2019-2020

Quiz
•
11th - 12th Grade
29 questions
cybersecurity worksheet

Quiz
•
9th Grade - University
28 questions
ACI - Mod 7 Part 2

Quiz
•
12th Grade
38 questions
Quiz Manfaat Ekonomi dan Wirausaha

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade