Data Security and Hacking Quiz

Data Security and Hacking Quiz

11th Grade

86 Qs

quiz-placeholder

Similar activities

Thiết kế và xây dựng hệ thống mạng LAN

Thiết kế và xây dựng hệ thống mạng LAN

9th - 12th Grade

90 Qs

CIW IBA Review 2

CIW IBA Review 2

9th - 12th Grade

85 Qs

Mid Assessment Benchmark

Mid Assessment Benchmark

9th - 12th Grade

90 Qs

Year 7 End of Year Quiz

Year 7 End of Year Quiz

6th Grade - University

82 Qs

my personal quiz

my personal quiz

9th - 12th Grade

82 Qs

Technology and Entertainment Quiz

Technology and Entertainment Quiz

11th Grade

84 Qs

A+Core 1 (200-300)#3

A+Core 1 (200-300)#3

10th Grade - University

92 Qs

IGCSE CS Chapter 1 - 3 Theory

IGCSE CS Chapter 1 - 3 Theory

9th - 12th Grade

85 Qs

Data Security and Hacking Quiz

Data Security and Hacking Quiz

Assessment

Passage

Computers

11th Grade

Hard

Created by

Ana Bracher

FREE Resource

86 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is data considered a valuable asset to people and organizations?

It can be easily replaced.

It must be kept secure against threats and to comply with legislation.

It is not important for security.

It is always public information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the duration of the hacking attack reported by eBay in May 2014?

100 days

150 days

229 days

300 days

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many people were reported to have their account details exposed in the eBay hacking attack?

100 million

145 million

200 million

250 million

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following details were included in the exposed account information during the eBay hacking attack?

Credit card numbers

Social security numbers

Names, addresses, dates of birth, and encrypted passwords

Medical records

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the practice of defending digital devices, including computers, servers, mobile devices, electronic systems, networks, and data, from malicious attacks called?

Data Analysis

Cyber-security

Network Management

Software Development

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common cyber-security threat to data security and digital systems?

Denial of service

Hacking

Malware

Data Analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why does the security level of data need to be high when using the cloud for storing data and information?

To ensure faster internet speeds

To prevent unauthorized access and data breaches

To reduce the cost of data storage

To increase the amount of data that can be stored

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?