L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

University

17 Qs

quiz-placeholder

Similar activities

J277 - 1.4 - Network Threats

J277 - 1.4 - Network Threats

10th Grade - University

16 Qs

CISD113 - 3

CISD113 - 3

University

15 Qs

CIS1103 Week 11-12 CLO 5 Security

CIS1103 Week 11-12 CLO 5 Security

University

16 Qs

Security Threats

Security Threats

10th Grade - University

20 Qs

Network and Internet Security

Network and Internet Security

University

20 Qs

Cisco 1, Module 16

Cisco 1, Module 16

University

15 Qs

Fundamentals 18 Understanding DDoS Attacks

Fundamentals 18 Understanding DDoS Attacks

9th Grade - University

20 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Jerry Jackson Bent

Used 1+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are intruders who exploit cyber security vulnerabilities called?

Hackers

Threat actors

Cyber police

Network administrators

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of threat that may arise after a threat actor gains access to the network?

Information theft

Data loss and manipulation

Identity theft

Software installation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of threat that may arise after a threat actor gains access to the network?

Data Loss and Manipulation

System upgrade

Network optimization

Software development

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for breaking into a computer to obtain confidential information?

Data Mining

Information Theft

Phishing

Social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data loss?

A threat actor sending a virus that reformats a computer hard drive

Breaking into a records system to change information

Changing the price of an item in a database

Altering data records without authorization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data manipulation?

A threat actor sending a virus that reformats a computer hard drive

Breaking into a records system to change information

Destroying data records

Reformatting a computer hard drive

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is identity theft?

A form of information theft where personal information is stolen to take over someone's identity.

A type of physical theft involving stealing someone's belongings.

A method of hacking into someone's computer to steal files.

A way to legally obtain someone's personal information.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?