Cybersecurity MS

Cybersecurity MS

12th Grade

50 Qs

quiz-placeholder

Similar activities

Coding Units 5-10

Coding Units 5-10

9th - 12th Grade

46 Qs

functions in python class 12  vaishali

functions in python class 12 vaishali

11th - 12th Grade

50 Qs

Latihan USPBK Simulasi dan Komunikasi Digital

Latihan USPBK Simulasi dan Komunikasi Digital

12th Grade

46 Qs

Basic Java with CodeHS

Basic Java with CodeHS

9th - 12th Grade

50 Qs

Comptia Network+ chapter 1-3 exam

Comptia Network+ chapter 1-3 exam

11th Grade - University

45 Qs

Networking - Practice Test #1

Networking - Practice Test #1

9th Grade - University

47 Qs

City & Guilds Certificate in Network & Architecture Assessment

City & Guilds Certificate in Network & Architecture Assessment

12th Grade

50 Qs

Test A

Test A

9th - 12th Grade

55 Qs

Cybersecurity MS

Cybersecurity MS

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Kristi Mowery

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passwords are used to improve _____ of a network.

Security

Performance

Reliability

Longevity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How would you be able to protect yourself from phishing?

Call your local fish store.

Get an Anti-Virus Program

Change Passwords Every 4-6 months

Both B&C

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a network reliability issue.

The number of users

The type of transmission medium

The frequency of failure

Unauthorized access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does identity theft cause problems for online users?

Steals social security

Locates where you live and all information

Steals bank information

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of rootkit will patch, hook, or replace the version of system call in order to hide information?

Library level rootkits

Kernal level rootkits

System level rootkits

Application level rootkits

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?

Close window

Never use your computer

Anti-Virus Program

Turn Off Computer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.

Database crash attack

DoS (Denial of Service) attack

Data overflow Attack

Buffer Overflow attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?