Cybersecurity MS

Cybersecurity MS

12th Grade

50 Qs

quiz-placeholder

Similar activities

Information Technology

Information Technology

12th Grade

50 Qs

Principles IT

Principles IT

9th - 12th Grade

45 Qs

Exam revision

Exam revision

1st - 12th Grade

47 Qs

Algoritmika 1.

Algoritmika 1.

10th Grade - University

50 Qs

DDPTJKT - Latihan Soal PTS Genap

DDPTJKT - Latihan Soal PTS Genap

10th Grade - University

50 Qs

#3 CIW Data Analyst - Certification Prep

#3 CIW Data Analyst - Certification Prep

9th Grade - University

54 Qs

TryOut Ujian Sekolah Pengetahuan - TIK SMP N 1 JEPARA

TryOut Ujian Sekolah Pengetahuan - TIK SMP N 1 JEPARA

12th Grade

45 Qs

2022 Ps Cert Review

2022 Ps Cert Review

12th Grade

50 Qs

Cybersecurity MS

Cybersecurity MS

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Kristi Mowery

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passwords are used to improve _____ of a network.

Security

Performance

Reliability

Longevity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How would you be able to protect yourself from phishing?

Call your local fish store.

Get an Anti-Virus Program

Change Passwords Every 4-6 months

Both B&C

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a network reliability issue.

The number of users

The type of transmission medium

The frequency of failure

Unauthorized access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does identity theft cause problems for online users?

Steals social security

Locates where you live and all information

Steals bank information

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of rootkit will patch, hook, or replace the version of system call in order to hide information?

Library level rootkits

Kernal level rootkits

System level rootkits

Application level rootkits

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?

Close window

Never use your computer

Anti-Virus Program

Turn Off Computer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.

Database crash attack

DoS (Denial of Service) attack

Data overflow Attack

Buffer Overflow attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?