Search Header Logo

CHAPTER 3 - SECURITY BREACHES

Authored by N M

Computers

University

10 Questions

Used 5+ times

CHAPTER 3 - SECURITY BREACHES
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Types of security breaches EXCEPT ______.

DDOS

Man in the middle attack

Phishing

Encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common method of securing data?

Encryption

Firewall

DDOS

Spam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a security breach where an attacker intercepts communication between two parties?

Phishing

Man in the middle attack

DDOS

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data breach refers to break in without authorization and getting away with information.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ refers to executes unauthorized actions on the victim's system.

Sniffing

DOS

cross-site scripting

Malware attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a security breach where an attacker sends emails pretending to be from a reputable company in order to induce individuals to reveal personal information, such as passwords and credit card numbers?

DDOS

Man in the middle attack

Phishing

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of security breach that floods a network or server with traffic, causing it to become overwhelmed and unavailable to users?

Encryption

Firewall

DDOS

Spam

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?