CHAPTER 3 - SECURITY BREACHES

CHAPTER 3 - SECURITY BREACHES

University

10 Qs

quiz-placeholder

Similar activities

AP Computer Science Principles Vocabulary

AP Computer Science Principles Vocabulary

10th Grade - University

10 Qs

Cyber Security QUIZ

Cyber Security QUIZ

University

10 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

Identifica el tipo de ataque

Identifica el tipo de ataque

5th Grade - University

13 Qs

Valorant (Hard)

Valorant (Hard)

KG - Professional Development

9 Qs

Unit 3 - 4.1.2 Wireless Devices

Unit 3 - 4.1.2 Wireless Devices

9th Grade - University

10 Qs

Cyberthreats

Cyberthreats

University

10 Qs

Digital Communication II

Digital Communication II

5th Grade - University

15 Qs

CHAPTER 3 - SECURITY BREACHES

CHAPTER 3 - SECURITY BREACHES

Assessment

Quiz

Computers

University

Hard

Created by

N M

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Types of security breaches EXCEPT ______.

DDOS

Man in the middle attack

Phishing

Encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common method of securing data?

Encryption

Firewall

DDOS

Spam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a security breach where an attacker intercepts communication between two parties?

Phishing

Man in the middle attack

DDOS

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data breach refers to break in without authorization and getting away with information.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ refers to executes unauthorized actions on the victim's system.

Sniffing

DOS

cross-site scripting

Malware attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a security breach where an attacker sends emails pretending to be from a reputable company in order to induce individuals to reveal personal information, such as passwords and credit card numbers?

DDOS

Man in the middle attack

Phishing

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of security breach that floods a network or server with traffic, causing it to become overwhelmed and unavailable to users?

Encryption

Firewall

DDOS

Spam

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?