Network Security and Threats Quiz

Network Security and Threats Quiz

12th Grade

10 Qs

quiz-placeholder

Similar activities

Security Risks

Security Risks

9th - 12th Grade

8 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Unit 10 AP CSP Advanced

Unit 10 AP CSP Advanced

9th - 12th Grade

10 Qs

Computer Misuse Act 1990

Computer Misuse Act 1990

9th - 12th Grade

7 Qs

Big Data & Cyber

Big Data & Cyber

9th - 12th Grade

15 Qs

Unit 1 Online World Exam Revision

Unit 1 Online World Exam Revision

12th Grade

10 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

AP CSP BI 5

AP CSP BI 5

9th - 12th Grade

9 Qs

Network Security and Threats Quiz

Network Security and Threats Quiz

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Mr Long

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the overall aim of network security?

To allow unauthorized users to access what they need

To prevent any unauthorized access

To maximize the potential damage caused by unauthorized access

To minimize the potential damage caused by unauthorized access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hacker?

A person who attempts to gain access to a computer system with the intent of damaging data

A person who attempts to gain access to a computer system with the intent of fixing vulnerabilities

A person who attempts to gain access to a computer system with no malicious intent

A person who attempts to gain access to a computer system with the intent of stealing company secrets

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A type of firewall

A type of encryption

A type of proxy

A type of computer code written with the intent to frustrate or harm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer virus?

A piece of code capable of copying itself and spreading throughout a system

A form of malware that covertly obtains information about a user's computer activities

An attack that floods a server with useless traffic

A code injection technique used to attack data-driven applications

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering?

A technique used to attack data-driven applications

A technique used to prevent unauthorized internet traffic

A technique used to exploit human error and obtain private information

A technique used to encrypt plain text into an unreadable form

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A technique used to trick users into giving out personal information

A technique used to install malicious code on a PC or server

A technique used to flood a server with useless traffic

A technique used to attack data-driven applications

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a firewall?

A piece of software or hardware configured to let only certain types of traffic through

A requirement for users to log in with predetermined credentials

An application that prevents and minimizes threats by inspecting data traveling across it

A physical device placed between a network and a remote source

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?