IT - Threats to data

IT - Threats to data

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

Messer Questions 51 - 75

Messer Questions 51 - 75

9th Grade

25 Qs

ciberseguridad

ciberseguridad

11th Grade

15 Qs

Cybersecurity

Cybersecurity

10th - 12th Grade

22 Qs

Empowerment Technology

Empowerment Technology

11th Grade

20 Qs

Cuestionario sobre Ciberseguridad

Cuestionario sobre Ciberseguridad

11th Grade - University

16 Qs

Computer Security & Malware Quiz Review

Computer Security & Malware Quiz Review

9th - 12th Grade

23 Qs

1.02 Setting a PC System Vocabulary

1.02 Setting a PC System Vocabulary

11th Grade

22 Qs

IT - Threats to data

IT - Threats to data

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Hard

Created by

Mohamed Hussein

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary goal of a "man-in-the-middle" attack

Unauthorized access to a system.

Intercepting and altering communication between two parties.

Injecting malicious code into a website.

Exploiting software vulnerabilities.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity

SQL injection.

DDoS attacks.

Phishing

Ransomware

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of encryption?

To obscure data and make it unreadable without the appropriate decryption key.

To detect and prevent malware.

To enhance network speed.

To create secure passwords

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of a firewall?

To encrypt data.

To filter and monitor network traffic, allowing or blocking specific activities.

To scan for malware in emails.

To recover lost data.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves the encryption of files or systems, demanding payment for their release

Phishing

Ransomware

Spyware

Trojan horse.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves the insertion of malicious software into a legitimate program or file to compromise a system

Spyware.

Worm.

Trojan horse.

Adware.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

what is the term for a program that appears harmless but performs malicious activities in the background?

Worm

Ransomware

Spyware

Botnet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?