Tick all that apply: APP 11 requires that APP entities...
12 CSC ATAR - Cyber security

Quiz
•
Computers
•
12th Grade
•
Easy

Alex K
Used 10+ times
FREE Resource
17 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Take active measures to ensure the security of personal information it holds, and to actively consider whether it is permitted to retain personal information.
Take reasonable steps to protect personal information from misuse, interference and loss, as well as unauthorised access, modification or disclosure.
Take reasonable steps to destroy or de-identify the personal information it holds once the personal information is no longer needed.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Masquerading as a trusted device or user by forging the source IP address in network packets.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Multiple sources coordinating an attack on a network, server, or website, by sending excessive network traffic to exhaust resources and make the resource unavailable to legitimate users.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Exploiting vulnerabilities in web applications to insert malicious SQL code into a database query, potentially leading to data theft or manipulation.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Injecting malicious scripts into otherwise trusted websites. These scripts can then run in the user's browser, potentially stealing information or hijacking sessions.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software flaws unknown to the software vendor and, therefore, for which no patch exists.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hidden method of bypassing normal authentication or encryption in a computer system, network, or software application, often installed by attackers.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
MTA - Mobility and Devices Fundamentals Part 1

Quiz
•
10th Grade - Professi...
20 questions
Cyber security

Quiz
•
9th - 12th Grade
18 questions
Cybersecurity Vocabulary 2022

Quiz
•
9th - 12th Grade
20 questions
security best practices

Quiz
•
10th Grade - University
20 questions
040_An Overview of Malware – CompTIA Security+ SY0-701

Quiz
•
9th Grade - University
15 questions
Networking

Quiz
•
9th - 12th Grade
15 questions
VPN Quiz - 21 Nov 23

Quiz
•
9th - 12th Grade
13 questions
Paper 1 - Quick Quiz 2

Quiz
•
12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade