L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

University

17 Qs

quiz-placeholder

Similar activities

Banco de Dados

Banco de Dados

University - Professional Development

20 Qs

Komponen Jaringan & Pengkabelan

Komponen Jaringan & Pengkabelan

University

15 Qs

Python Quiz For Starters

Python Quiz For Starters

3rd Grade - Professional Development

17 Qs

Multimedia Video & Animation

Multimedia Video & Animation

University

20 Qs

Django-quiz

Django-quiz

5th Grade - University

20 Qs

DreamWeaver CS6

DreamWeaver CS6

University

20 Qs

ER MODEL

ER MODEL

University

15 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Jerry Jackson Bent

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are intruders who exploit cyber security vulnerabilities called?

Hackers

Threat actors

Cyber police

Network administrators

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of threat that may arise after a threat actor gains access to the network?

Information theft

Data loss and manipulation

Identity theft

Software installation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of threat that may arise after a threat actor gains access to the network?

Data Loss and Manipulation

System upgrade

Network optimization

Software development

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for breaking into a computer to obtain confidential information?

Data Mining

Information Theft

Phishing

Social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data loss?

A threat actor sending a virus that reformats a computer hard drive

Breaking into a records system to change information

Changing the price of an item in a database

Altering data records without authorization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data manipulation?

A threat actor sending a virus that reformats a computer hard drive

Breaking into a records system to change information

Destroying data records

Reformatting a computer hard drive

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is identity theft?

A form of information theft where personal information is stolen to take over someone's identity.

A type of physical theft involving stealing someone's belongings.

A method of hacking into someone's computer to steal files.

A way to legally obtain someone's personal information.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?