
Dom. Reg Morning 9:45am . Final Exam Living I.T. Era
Authored by Alpie Catama
Information Technology (IT)
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
FILL IN THE BLANKS QUESTION
5 sec • 1 pt
What does CIA stand for in the context of IT security?
(a)
2.
MULTIPLE CHOICE QUESTION
5 sec • 1 pt
What is the primary purpose of a firewall?
To prevent malware from infecting the system
To block unauthorized access while permitting authorized communications
To encrypt data during transmission
To monitor user activity on the internet
3.
MULTIPLE CHOICE QUESTION
5 sec • 1 pt
What type of attack involves flooding a network with traffic to overload a system?
Phishing
Man-in-the-Middle attack
Denial of Service (DoS) attack
SQL Injection
4.
MULTIPLE CHOICE QUESTION
5 sec • 1 pt
Which of the following is a social engineering attack?
Malware
Phishing
Ransomware
Virus
5.
MULTIPLE CHOICE QUESTION
5 sec • 1 pt
What is the role of encryption in cybersecurity?
To speed up internet connections
To scramble data so that only authorized parties can read it
To delete unnecessary files on a computer
To create backups of data
6.
MULTIPLE CHOICE QUESTION
5 sec • 1 pt
Which one of the following is a common form of malware?
SSL
Virus
SQL
HTTPS
7.
MULTIPLE CHOICE QUESTION
5 sec • 1 pt
What is a zero-day exploit?
A vulnerability that has not yet been discovered
An attack that occurs immediately after the vulnerability is disclosed
A new type of virus
A backup strategy for cybersecurity
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?