NETESS 2.0 MODULE 15 QUIZ - Security Threats

NETESS 2.0 MODULE 15 QUIZ - Security Threats

12th Grade

33 Qs

quiz-placeholder

Similar activities

98-367 PT3

98-367 PT3

9th - 12th Grade

35 Qs

COMPTIA ITF

COMPTIA ITF

1st Grade - Professional Development

29 Qs

Game Dev and Programming Recap

Game Dev and Programming Recap

8th Grade - University

29 Qs

Prefinal - Data Privacy

Prefinal - Data Privacy

12th Grade

32 Qs

1.1: [Assess] Google Drive & Docs

1.1: [Assess] Google Drive & Docs

9th - 12th Grade

28 Qs

CompTIA A+ U9

CompTIA A+ U9

9th Grade - Professional Development

31 Qs

SD Chapter 3 Terms

SD Chapter 3 Terms

12th Grade

36 Qs

NETESS 2.0 MODULE 15 QUIZ - Security Threats

NETESS 2.0 MODULE 15 QUIZ - Security Threats

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ereck Ladd

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Sending a virus that will format the hard drive of a computer is an example of data loss or manipulation threat.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Using stolen credit or identity information to make illegal online purchases is an example of identity theft.


3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor prevents legal users from accessing data services?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Disruption of service attacks occur when legitimate users are prevented from accessing data and services.


4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor steals scientific research data?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Stealing research data or proprietary information is an example of information theft.


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor overloads a network to deny other users network access?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Disruption of service attacks occur when legitimate users are prevented from accessing data and services or the network.


6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor alters data records?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Altering data records is an example of data loss or manipulation.


7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor is stealing the user database of a company?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Stealing data records or proprietary information is an example of information theft.


Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?