Module 1.1: Common Threats

Module 1.1: Common Threats

12th Grade

25 Qs

quiz-placeholder

Similar activities

HTML - CSS - JS intro

HTML - CSS - JS intro

10th - 12th Grade

20 Qs

Online Platform Block Q

Online Platform Block Q

11th - 12th Grade

20 Qs

City & Guilds Award in Business Processes

City & Guilds Award in Business Processes

12th Grade

20 Qs

ASPEK LEGAL TIK XII

ASPEK LEGAL TIK XII

12th Grade

20 Qs

Pengayaan Informatika

Pengayaan Informatika

12th Grade

20 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

JUGANDO APRENDO EN LA WEB

JUGANDO APRENDO EN LA WEB

12th Grade

20 Qs

EXCEL DIAGNÓSTICO

EXCEL DIAGNÓSTICO

10th Grade - University

20 Qs

Module 1.1: Common Threats

Module 1.1: Common Threats

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Damian Green

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a common type of cyber threat?

Malware

Phishing

Firewall

Denial of Service (DoS)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term describes a weakness in a system that can be exploited by an attacker?

Threat

Vulnerability

Attack

Exploit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an internal threat?

Hackers from another country

Natural disasters

Disgruntled employees

Competitors stealing data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary difference between threats to private and public clouds?

Private clouds are immune to threats

Public clouds are always more secure

Private clouds have more control over security measures

Public clouds only face external threats

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common user vulnerability?

Using strong, unique passwords

Falling for phishing emails

Regularly updating software

Enabling two-factor authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware hides itself and provides unauthorized access to a system?

Virus

Worm

Trojan horse

Rootkit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which threat is specifically designed to exploit vulnerabilities in applications?

SQL injection

Physical theft

Power outage

Network sniffer

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?