Search Header Logo

Securing Information Systems - Chapter 10

Authored by Jill Miller

Information Technology (IT)

12th Grade

DOK Level 1: Recall covered

Used 7+ times

Securing Information Systems - Chapter 10
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a phishing attack?

A hacker uses a brute force attack to guess passwords.

An attacker sends an email pretending to be a trusted entity to steal sensitive information.

A virus that replicates itself to spread to other computers.

A denial-of-service attack that overwhelms a system with traffic.

Tags

DOK Level 1: Recall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the principle of "least privilege" entail in information security?

Users should have the maximum level of access to perform their tasks.

Users should have access only to the information and resources necessary for their job functions.

All users should have administrative privileges.

Users should share their passwords with their supervisors.

Tags

DOK Level 1: Recall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is commonly used to secure web traffic?

FTP

HTTP

HTTPS

SMTP

Tags

DOK Level 1: Recall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of data encryption?

To compress data for storage efficiency.

To convert data into a format that is unreadable without a decryption key.

To back up data to a remote server.

To delete sensitive data securely.

Tags

DOK Level 1: Recall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method of access control?

Firewall

Antivirus software

Role-Based Access Control (RBAC)

Data encryption

Tags

DOK Level 1: Recall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in an incident response plan?

Eradication

Containment

Identification

Recovery

Tags

DOK Level 1: Recall

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that encrypts a user's files and demands payment for the decryption key?

Spyware

Ransomware

Adware

Worm

Tags

DOK Level 1: Recall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?