Securing Information Systems - Chapter 10

Securing Information Systems - Chapter 10

12th Grade

10 Qs

quiz-placeholder

Similar activities

SSC Summer Camp Pre-Quiz

SSC Summer Camp Pre-Quiz

9th - 12th Grade

10 Qs

PDPA - Is it just common sense?

PDPA - Is it just common sense?

12th Grade

13 Qs

Fundamentals

Fundamentals

7th Grade - University

12 Qs

Network secutiry

Network secutiry

9th Grade - University

10 Qs

Lesson 1: Online Services

Lesson 1: Online Services

9th - 12th Grade

15 Qs

Test

Test

12th Grade - University

8 Qs

AP CK CyberSecurity Unit 4

AP CK CyberSecurity Unit 4

12th Grade

10 Qs

Quiz in ICT 9

Quiz in ICT 9

9th - 12th Grade

10 Qs

Securing Information Systems - Chapter 10

Securing Information Systems - Chapter 10

Assessment

Quiz

Information Technology (IT)

12th Grade

Easy

DOK Level 1: Recall

Standards-aligned

Created by

Jill Miller

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a phishing attack?

A hacker uses a brute force attack to guess passwords.

An attacker sends an email pretending to be a trusted entity to steal sensitive information.

A virus that replicates itself to spread to other computers.

A denial-of-service attack that overwhelms a system with traffic.

Tags

DOK Level 1: Recall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the principle of "least privilege" entail in information security?

Users should have the maximum level of access to perform their tasks.

Users should have access only to the information and resources necessary for their job functions.

All users should have administrative privileges.

Users should share their passwords with their supervisors.

Tags

DOK Level 1: Recall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is commonly used to secure web traffic?

FTP

HTTP

HTTPS

SMTP

Tags

DOK Level 1: Recall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of data encryption?

To compress data for storage efficiency.

To convert data into a format that is unreadable without a decryption key.

To back up data to a remote server.

To delete sensitive data securely.

Tags

DOK Level 1: Recall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method of access control?

Firewall

Antivirus software

Role-Based Access Control (RBAC)

Data encryption

Tags

DOK Level 1: Recall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in an incident response plan?

Eradication

Containment

Identification

Recovery

Tags

DOK Level 1: Recall

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that encrypts a user's files and demands payment for the decryption key?

Spyware

Ransomware

Adware

Worm

Tags

DOK Level 1: Recall

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?