Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade

10 Qs

quiz-placeholder

Similar activities

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

11 Qs

Network Security

Network Security

9th Grade

13 Qs

AP CSP Unit 8 Review

AP CSP Unit 8 Review

11th Grade

12 Qs

CSP 10-7 Security Risks

CSP 10-7 Security Risks

9th - 11th Grade

8 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Information Security and Intellectual Property

Information Security and Intellectual Property

9th Grade

15 Qs

18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

9th - 12th Grade

11 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Assessment

Quiz

Computers

9th Grade

Easy

Created by

Andy Johnson

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity via email?

Ransomware

Phishing

Spoofing

Keylogging

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cyber security incident involves software that is designed to disrupt, damage, or gain unauthorized access to a computer system?

Phishing

Malware

Data leakage

SQL injection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called when unauthorized individuals gain access to a company's data or networks?

Data breach

Phishing

Malware infection

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves manipulating individuals into divulging confidential or personal information that may be used for fraudulent purposes?

Phishing

Social engineering

Insider threat

Data breach

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Denial of Service (DoS) attack intended to do?

Steal user data

Encrypt files for ransom

Interrupt the availability of a service

Gain unauthorized access to network devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cyber security threat comes from within an organization, often by an employee or former employee?

Phishing

Malware

Insider threat

Social engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe any event that has the potential to cause harm to an organization's information systems or data?

Security protocol

Security incident

Security policy

Security audit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?