Search Header Logo

L7 MSC Network Security Quiz

Authored by Jerry Jackson Bent

Computers

University

Used 1+ times

L7 MSC Network Security Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are intruders who exploit cyber security vulnerabilities called?

Hackers

Threat actors

Cyber police

Network administrators

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of threat that may arise after a threat actor gains access to the network?

Information theft

Data loss and manipulation

Identity theft

Software installation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of threat that may arise after a threat actor gains access to the network?

Data Loss and Manipulation

System upgrade

Network optimization

Software development

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for breaking into a computer to obtain confidential information?

Data Mining

Information Theft

Phishing

Social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data loss?

A threat actor sending a virus that reformats a computer hard drive

Breaking into a records system to change information

Changing the price of an item in a database

Altering data records without authorization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data manipulation?

A threat actor sending a virus that reformats a computer hard drive

Breaking into a records system to change information

Destroying data records

Reformatting a computer hard drive

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is identity theft?

A form of information theft where personal information is stolen to take over someone's identity.

A type of physical theft involving stealing someone's belongings.

A method of hacking into someone's computer to steal files.

A way to legally obtain someone's personal information.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?