CHAPTER 3 - SECURITY BREACHES

CHAPTER 3 - SECURITY BREACHES

University

10 Qs

quiz-placeholder

Similar activities

Securing Your Identity: MFA Edition

Securing Your Identity: MFA Edition

University

15 Qs

CIS2103 Week 1-2 CLO1-5 Ch_1_b

CIS2103 Week 1-2 CLO1-5 Ch_1_b

University

6 Qs

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

DFIR - Phase 2 - Detection

DFIR - Phase 2 - Detection

University

10 Qs

Cloud Security

Cloud Security

University

9 Qs

CS180-C7&8

CS180-C7&8

University

12 Qs

Cybersecurity Terminology Quiz Part 1

Cybersecurity Terminology Quiz Part 1

University

15 Qs

Chapter 9 Audit Log

Chapter 9 Audit Log

University

10 Qs

CHAPTER 3 - SECURITY BREACHES

CHAPTER 3 - SECURITY BREACHES

Assessment

Quiz

Computers

University

Hard

Created by

N M

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Types of security breaches EXCEPT ______.

DDOS

Man in the middle attack

Phishing

Encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common method of securing data?

Encryption

Firewall

DDOS

Spam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a security breach where an attacker intercepts communication between two parties?

Phishing

Man in the middle attack

DDOS

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data breach refers to break in without authorization and getting away with information.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ refers to executes unauthorized actions on the victim's system.

Sniffing

DOS

cross-site scripting

Malware attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a security breach where an attacker sends emails pretending to be from a reputable company in order to induce individuals to reveal personal information, such as passwords and credit card numbers?

DDOS

Man in the middle attack

Phishing

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of security breach that floods a network or server with traffic, causing it to become overwhelmed and unavailable to users?

Encryption

Firewall

DDOS

Spam

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?