IT - Threats to data

IT - Threats to data

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

IC3 GS6 Domain 4 Assessment

IC3 GS6 Domain 4 Assessment

6th - 12th Grade

17 Qs

STS QUIZ #2

STS QUIZ #2

12th Grade - University

17 Qs

CPA JYSS 2018 Prelims Paper 1

CPA JYSS 2018 Prelims Paper 1

7th Grade - Professional Development

20 Qs

Mechanical Drive Term 3 V-belt Part 1

Mechanical Drive Term 3 V-belt Part 1

12th Grade

20 Qs

UTS Administrasi Infrastruktur Jaringan

UTS Administrasi Infrastruktur Jaringan

12th Grade

20 Qs

Segurança na Internet

Segurança na Internet

9th Grade

15 Qs

8 News Values and Capitalization

8 News Values and Capitalization

9th - 12th Grade

20 Qs

Principles of Design

Principles of Design

6th Grade - University

20 Qs

IT - Threats to data

IT - Threats to data

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Practice Problem

Hard

Created by

Mohamed Hussein

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary goal of a "man-in-the-middle" attack

Unauthorized access to a system.

Intercepting and altering communication between two parties.

Injecting malicious code into a website.

Exploiting software vulnerabilities.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity

SQL injection.

DDoS attacks.

Phishing

Ransomware

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of encryption?

To obscure data and make it unreadable without the appropriate decryption key.

To detect and prevent malware.

To enhance network speed.

To create secure passwords

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of a firewall?

To encrypt data.

To filter and monitor network traffic, allowing or blocking specific activities.

To scan for malware in emails.

To recover lost data.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves the encryption of files or systems, demanding payment for their release

Phishing

Ransomware

Spyware

Trojan horse.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves the insertion of malicious software into a legitimate program or file to compromise a system

Spyware.

Worm.

Trojan horse.

Adware.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

what is the term for a program that appears harmless but performs malicious activities in the background?

Worm

Ransomware

Spyware

Botnet

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?