Search Header Logo

NETESS 2.0 MODULE 15 QUIZ - Security Threats

Authored by Ereck Ladd

Computers

12th Grade

Used 1+ times

NETESS 2.0 MODULE 15 QUIZ - Security Threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Sending a virus that will format the hard drive of a computer is an example of data loss or manipulation threat.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Using stolen credit or identity information to make illegal online purchases is an example of identity theft.


3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor prevents legal users from accessing data services?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Disruption of service attacks occur when legitimate users are prevented from accessing data and services.


4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor steals scientific research data?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Stealing research data or proprietary information is an example of information theft.


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor overloads a network to deny other users network access?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Disruption of service attacks occur when legitimate users are prevented from accessing data and services or the network.


6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor alters data records?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Altering data records is an example of data loss or manipulation.


7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor is stealing the user database of a company?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Stealing data records or proprietary information is an example of information theft.


Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?