Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

12th Grade

25 Qs

quiz-placeholder

Similar activities

PTS Ganjil Grade XII 2024

PTS Ganjil Grade XII 2024

12th Grade

20 Qs

Understanding the SPEC Formula (AI Prompt)

Understanding the SPEC Formula (AI Prompt)

12th Grade

20 Qs

Exploring the World of AI

Exploring the World of AI

6th Grade - University

20 Qs

Flaws of Artificial Intelligence (AI)

Flaws of Artificial Intelligence (AI)

9th - 12th Grade

20 Qs

AI trong Khoa học và Đời sống

AI trong Khoa học và Đời sống

12th Grade

20 Qs

asesmen CP Literasi Digital TP 1 - 6

asesmen CP Literasi Digital TP 1 - 6

12th Grade

20 Qs

Soal Koding & Kecerdasan Artifisial untuk SMA/SMK

Soal Koding & Kecerdasan Artifisial untuk SMA/SMK

12th Grade

20 Qs

Test sull'Intelligenza Artificiale

Test sull'Intelligenza Artificiale

12th Grade

23 Qs

Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

Assessment

Quiz

Information Technology (IT)

12th Grade

Medium

Created by

Alpie Catama

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

5 sec • 1 pt

What does CIA stand for in the context of IT security?

2.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is the primary purpose of a firewall?

To prevent malware from infecting the system

To block unauthorized access while permitting authorized communications

To encrypt data during transmission

To monitor user activity on the internet

3.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What type of attack involves flooding a network with traffic to overload a system?

Phishing

Man-in-the-Middle attack

Denial of Service (DoS) attack

SQL Injection

4.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Which of the following is a social engineering attack?

Malware

Phishing

Ransomware

Virus

5.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is the role of encryption in cybersecurity?

To speed up internet connections

To scramble data so that only authorized parties can read it

To delete unnecessary files on a computer

To create backups of data

6.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Which one of the following is a common form of malware?

SSL

Virus

SQL

HTTPS

7.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is a zero-day exploit?

A vulnerability that has not yet been discovered

An attack that occurs immediately after the vulnerability is disclosed

A new type of virus

A backup strategy for cybersecurity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?