CHAPTER 3 - SECURITY BREACHES

CHAPTER 3 - SECURITY BREACHES

University

10 Qs

quiz-placeholder

Similar activities

DBMS

DBMS

University

15 Qs

Internet Basics

Internet Basics

5th Grade - University

15 Qs

ADB Quiz #1

ADB Quiz #1

University

15 Qs

Computer and Other Human Inventions

Computer and Other Human Inventions

University

15 Qs

Emails and Netiquettes

Emails and Netiquettes

University

15 Qs

Mobile Computing P11

Mobile Computing P11

University

10 Qs

Sistema Operacional IOS

Sistema Operacional IOS

University

14 Qs

GDPR

GDPR

University

10 Qs

CHAPTER 3 - SECURITY BREACHES

CHAPTER 3 - SECURITY BREACHES

Assessment

Quiz

Computers

University

Hard

Created by

N M

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Types of security breaches EXCEPT ______.

DDOS

Man in the middle attack

Phishing

Encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common method of securing data?

Encryption

Firewall

DDOS

Spam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a security breach where an attacker intercepts communication between two parties?

Phishing

Man in the middle attack

DDOS

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data breach refers to break in without authorization and getting away with information.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ refers to executes unauthorized actions on the victim's system.

Sniffing

DOS

cross-site scripting

Malware attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a security breach where an attacker sends emails pretending to be from a reputable company in order to induce individuals to reveal personal information, such as passwords and credit card numbers?

DDOS

Man in the middle attack

Phishing

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of security breach that floods a network or server with traffic, causing it to become overwhelmed and unavailable to users?

Encryption

Firewall

DDOS

Spam

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?