Cybersecurity MS

Cybersecurity MS

12th Grade

50 Qs

quiz-placeholder

Similar activities

The Internet - AP CSP Unit 4

The Internet - AP CSP Unit 4

9th - 12th Grade

53 Qs

Intro To Networking 123

Intro To Networking 123

9th - 12th Grade

53 Qs

Module 1: Network Security Certification Exam

Module 1: Network Security Certification Exam

9th - 12th Grade

46 Qs

XII-AdminInfJar - Firewall

XII-AdminInfJar - Firewall

12th Grade

50 Qs

NetAcad Quiz Questions

NetAcad Quiz Questions

11th Grade - University

48 Qs

CompTIA A+ 220-1101 Practice Test 5+6 By Mr. B

CompTIA A+ 220-1101 Practice Test 5+6 By Mr. B

12th Grade

55 Qs

Exam Review

Exam Review

9th - 12th Grade

50 Qs

G12-CSS-Q1-M1-M4

G12-CSS-Q1-M1-M4

12th Grade

50 Qs

Cybersecurity MS

Cybersecurity MS

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Kristi Mowery

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passwords are used to improve _____ of a network.

Security

Performance

Reliability

Longevity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How would you be able to protect yourself from phishing?

Call your local fish store.

Get an Anti-Virus Program

Change Passwords Every 4-6 months

Both B&C

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a network reliability issue.

The number of users

The type of transmission medium

The frequency of failure

Unauthorized access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does identity theft cause problems for online users?

Steals social security

Locates where you live and all information

Steals bank information

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of rootkit will patch, hook, or replace the version of system call in order to hide information?

Library level rootkits

Kernal level rootkits

System level rootkits

Application level rootkits

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?

Close window

Never use your computer

Anti-Virus Program

Turn Off Computer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.

Database crash attack

DoS (Denial of Service) attack

Data overflow Attack

Buffer Overflow attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?