Security Threats Quiz

Security Threats Quiz

12th Grade

20 Qs

quiz-placeholder

Similar activities

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

12th Grade

20 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

tik kelas 7

tik kelas 7

1st Grade - University

15 Qs

Pengetahuan Dasar Komputer

Pengetahuan Dasar Komputer

9th - 12th Grade

20 Qs

Visual Basic Assessment

Visual Basic Assessment

11th - 12th Grade

21 Qs

Dasar Desain Grafis

Dasar Desain Grafis

12th Grade - University

15 Qs

BIM1014 Quiz 2

BIM1014 Quiz 2

KG - University

15 Qs

PRUEBA CORTA I - SISTEMA E INSTALACIÓN DE SOFTWARE I - U4

PRUEBA CORTA I - SISTEMA E INSTALACIÓN DE SOFTWARE I - U4

9th - 12th Grade

15 Qs

Security Threats Quiz

Security Threats Quiz

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Naquai Roundtree

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common technique used in social engineering attacks?

A) Brute force attack

B) Phishing

C) SQL injection

D) Buffer overflow

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a software vulnerability?

A) Use of hard-coded passwords

B) Outdated antivirus software

C) SQL injection

D) Buffer overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of network security threat involves intercepting data packets as they travel across a network?

A) Phishing

B) DDoS attack

C) Packet sniffing

D) Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a physical security risk?

A) SQL injection

B) Tailgating

C) Phishing

D) DDoS attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What data encryption technique involves using the same key for both encryption and decryption?

A) Asymmetric encryption

B) Symmetric encryption

C) Hashing

D) Salting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which social engineering attack involves an attacker pretending to be a high-level executive to trick employees into giving them access to sensitive information?

A) Baiting

B) Pretexting

C) Phishing

D) Whaling

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A) A vulnerability that has been patched but not yet released to the public

B) A vulnerability that is known to the software vendor but not yet fixed

C) A vulnerability that is unknown to the software vendor and thus has no patch

D) A vulnerability that only affects zero-day old software

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?