Securing Information Systems - Chapter 10

Securing Information Systems - Chapter 10

12th Grade

10 Qs

quiz-placeholder

Similar activities

Quiz sobre React Native

Quiz sobre React Native

12th Grade

15 Qs

Bienvenida al Diseño Gráfico

Bienvenida al Diseño Gráfico

12th Grade - University

10 Qs

Profesi Utama di Bidang Informatika

Profesi Utama di Bidang Informatika

10th Grade - University

15 Qs

Informatika X Bab 1 Validitas Sumber Data dan Evaluasinya

Informatika X Bab 1 Validitas Sumber Data dan Evaluasinya

10th Grade - University

15 Qs

Pengenalan Perangkat Lunak Kelas 7

Pengenalan Perangkat Lunak Kelas 7

7th Grade - University

10 Qs

Quiz konsep Algoritma

Quiz konsep Algoritma

11th Grade - University

10 Qs

G4-Microprocessors and Their Uses

G4-Microprocessors and Their Uses

4th Grade - University

15 Qs

7 класс программирование

7 класс программирование

7th Grade - University

10 Qs

Securing Information Systems - Chapter 10

Securing Information Systems - Chapter 10

Assessment

Quiz

Information Technology (IT)

12th Grade

Practice Problem

Easy

DOK Level 1: Recall

Standards-aligned

Created by

Jill Miller

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a phishing attack?

A hacker uses a brute force attack to guess passwords.

An attacker sends an email pretending to be a trusted entity to steal sensitive information.

A virus that replicates itself to spread to other computers.

A denial-of-service attack that overwhelms a system with traffic.

Tags

DOK Level 1: Recall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the principle of "least privilege" entail in information security?

Users should have the maximum level of access to perform their tasks.

Users should have access only to the information and resources necessary for their job functions.

All users should have administrative privileges.

Users should share their passwords with their supervisors.

Tags

DOK Level 1: Recall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is commonly used to secure web traffic?

FTP

HTTP

HTTPS

SMTP

Tags

DOK Level 1: Recall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of data encryption?

To compress data for storage efficiency.

To convert data into a format that is unreadable without a decryption key.

To back up data to a remote server.

To delete sensitive data securely.

Tags

DOK Level 1: Recall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method of access control?

Firewall

Antivirus software

Role-Based Access Control (RBAC)

Data encryption

Tags

DOK Level 1: Recall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in an incident response plan?

Eradication

Containment

Identification

Recovery

Tags

DOK Level 1: Recall

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that encrypts a user's files and demands payment for the decryption key?

Spyware

Ransomware

Adware

Worm

Tags

DOK Level 1: Recall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?