NETESS 2.0 MODULE 15 QUIZ - Security Threats

NETESS 2.0 MODULE 15 QUIZ - Security Threats

12th Grade

33 Qs

quiz-placeholder

Similar activities

Microsoft Certification Device Configuration and Management

Microsoft Certification Device Configuration and Management

11th Grade - University

28 Qs

Cybersecurity II - Semester Exam Review by Mr. Benvenuto

Cybersecurity II - Semester Exam Review by Mr. Benvenuto

12th Grade

31 Qs

AP Computer Science Principles Cybersecurity

AP Computer Science Principles Cybersecurity

9th - 12th Grade

33 Qs

2.2  - Threat Actor Types

2.2 - Threat Actor Types

12th Grade

36 Qs

CyberOps Modules 24-25

CyberOps Modules 24-25

12th Grade

35 Qs

Chapter 16 Practice Test

Chapter 16 Practice Test

7th Grade - University

30 Qs

Vulnerabilities and Threats

Vulnerabilities and Threats

9th - 12th Grade

30 Qs

Digital Devices and Cyber Security

Digital Devices and Cyber Security

12th Grade

35 Qs

NETESS 2.0 MODULE 15 QUIZ - Security Threats

NETESS 2.0 MODULE 15 QUIZ - Security Threats

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ereck Ladd

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Sending a virus that will format the hard drive of a computer is an example of data loss or manipulation threat.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Using stolen credit or identity information to make illegal online purchases is an example of identity theft.


3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor prevents legal users from accessing data services?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Disruption of service attacks occur when legitimate users are prevented from accessing data and services.


4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor steals scientific research data?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Stealing research data or proprietary information is an example of information theft.


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor overloads a network to deny other users network access?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Disruption of service attacks occur when legitimate users are prevented from accessing data and services or the network.


6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor alters data records?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Altering data records is an example of data loss or manipulation.


7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor is stealing the user database of a company?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Stealing data records or proprietary information is an example of information theft.


Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?