
NETESS 2.0 MODULE 15 QUIZ - Security Threats
Authored by Ereck Ladd
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
33 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Sending a virus that will format the hard drive of a computer is an example of data loss or manipulation threat.
Sending a virus that will format the hard drive of a computer is an example of data loss or manipulation threat.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Using stolen credit or identity information to make illegal online purchases is an example of identity theft.
Using stolen credit or identity information to make illegal online purchases is an example of identity theft.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor prevents legal users from accessing data services?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Disruption of service attacks occur when legitimate users are prevented from accessing data and services.
Disruption of service attacks occur when legitimate users are prevented from accessing data and services.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor steals scientific research data?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Stealing research data or proprietary information is an example of information theft.
Stealing research data or proprietary information is an example of information theft.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor overloads a network to deny other users network access?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Disruption of service attacks occur when legitimate users are prevented from accessing data and services or the network.
Disruption of service attacks occur when legitimate users are prevented from accessing data and services or the network.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor alters data records?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Altering data records is an example of data loss or manipulation.
Altering data records is an example of data loss or manipulation.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor is stealing the user database of a company?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Stealing data records or proprietary information is an example of information theft.
Stealing data records or proprietary information is an example of information theft.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?