
CHAPTER 3 - SECURITY BREACHES
Authored by N M
Computers
University
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Types of security breaches EXCEPT ______.
DDOS
Man in the middle attack
Phishing
Encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a common method of securing data?
Encryption
Firewall
DDOS
Spam
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for a security breach where an attacker intercepts communication between two parties?
Phishing
Man in the middle attack
DDOS
Encryption
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Data breach refers to break in without authorization and getting away with information.
TRUE
FALSE
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
____________ refers to executes unauthorized actions on the victim's system.
Sniffing
DOS
cross-site scripting
Malware attacks
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for a security breach where an attacker sends emails pretending to be from a reputable company in order to induce individuals to reveal personal information, such as passwords and credit card numbers?
DDOS
Man in the middle attack
Phishing
Encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of security breach that floods a network or server with traffic, causing it to become overwhelmed and unavailable to users?
Encryption
Firewall
DDOS
Spam
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?