IT - Threats to data

IT - Threats to data

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

ciudadania digital

ciudadania digital

9th Grade

18 Qs

CompTIA A+ Acronyms Quiz

CompTIA A+ Acronyms Quiz

12th Grade

20 Qs

Kisi - Kisi SAJ SMPN 3 Cikembar Mata Pelajaran TIK

Kisi - Kisi SAJ SMPN 3 Cikembar Mata Pelajaran TIK

9th Grade

20 Qs

Internet Insights

Internet Insights

9th Grade

16 Qs

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

seguridad

seguridad

12th Grade

23 Qs

Etech Q3 module 2

Etech Q3 module 2

12th Grade

15 Qs

Malware/ IOC

Malware/ IOC

10th Grade - Professional Development

20 Qs

IT - Threats to data

IT - Threats to data

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Hard

Created by

Mohamed Hussein

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary goal of a "man-in-the-middle" attack

Unauthorized access to a system.

Intercepting and altering communication between two parties.

Injecting malicious code into a website.

Exploiting software vulnerabilities.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity

SQL injection.

DDoS attacks.

Phishing

Ransomware

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of encryption?

To obscure data and make it unreadable without the appropriate decryption key.

To detect and prevent malware.

To enhance network speed.

To create secure passwords

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of a firewall?

To encrypt data.

To filter and monitor network traffic, allowing or blocking specific activities.

To scan for malware in emails.

To recover lost data.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves the encryption of files or systems, demanding payment for their release

Phishing

Ransomware

Spyware

Trojan horse.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves the insertion of malicious software into a legitimate program or file to compromise a system

Spyware.

Worm.

Trojan horse.

Adware.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

what is the term for a program that appears harmless but performs malicious activities in the background?

Worm

Ransomware

Spyware

Botnet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?