Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

12th Grade

25 Qs

quiz-placeholder

Similar activities

Information System

Information System

12th Grade

22 Qs

NovaQuest'25 - Junior Category Final Round

NovaQuest'25 - Junior Category Final Round

9th Grade - University

25 Qs

COMPUTER SYSTEMS SERVICING 3

COMPUTER SYSTEMS SERVICING 3

12th Grade

20 Qs

làm quen với máy tính

làm quen với máy tính

3rd Grade - University

20 Qs

Nowoczesne technologie

Nowoczesne technologie

10th Grade - University

22 Qs

2_Quiz on the Revolution of Artificial Intelligence Бахта

2_Quiz on the Revolution of Artificial Intelligence Бахта

12th Grade

20 Qs

Gen AI Quiz - From Slide

Gen AI Quiz - From Slide

12th Grade

21 Qs

(Tin học 12) Bài 1 - Làm quen với trí tuệ nhân tạo

(Tin học 12) Bài 1 - Làm quen với trí tuệ nhân tạo

12th Grade

20 Qs

Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

Assessment

Quiz

Information Technology (IT)

12th Grade

Medium

Created by

Alpie Catama

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

5 sec • 1 pt

What does CIA stand for in the context of IT security?

2.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is the primary purpose of a firewall?

To prevent malware from infecting the system

To block unauthorized access while permitting authorized communications

To encrypt data during transmission

To monitor user activity on the internet

3.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What type of attack involves flooding a network with traffic to overload a system?

Phishing

Man-in-the-Middle attack

Denial of Service (DoS) attack

SQL Injection

4.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Which of the following is a social engineering attack?

Malware

Phishing

Ransomware

Virus

5.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is the role of encryption in cybersecurity?

To speed up internet connections

To scramble data so that only authorized parties can read it

To delete unnecessary files on a computer

To create backups of data

6.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Which one of the following is a common form of malware?

SSL

Virus

SQL

HTTPS

7.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is a zero-day exploit?

A vulnerability that has not yet been discovered

An attack that occurs immediately after the vulnerability is disclosed

A new type of virus

A backup strategy for cybersecurity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?