Digital Security Risk Quiz

Digital Security Risk Quiz

University

10 Qs

quiz-placeholder

Similar activities

Python list

Python list

University

10 Qs

Rowan - CSNP-04103 - First Day of Class

Rowan - CSNP-04103 - First Day of Class

University

11 Qs

Digital Privacy & Security Awareness

Digital Privacy & Security Awareness

University

6 Qs

NET101: Week 2-3

NET101: Week 2-3

University

10 Qs

Cybersecurity Essentials for Students

Cybersecurity Essentials for Students

University

15 Qs

Exploring Computer Networks

Exploring Computer Networks

University

8 Qs

EST-DATA COMMUNICATIONS REVIEWER

EST-DATA COMMUNICATIONS REVIEWER

University

7 Qs

Digital Security Risk Quiz

Digital Security Risk Quiz

Assessment

Quiz

Others

University

Hard

Created by

Keith Nierras

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a backup?

To enhance data processing speed

To improve network security

To make copies of data for recovery

To increase storage capacity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of intangible information asset?

Printed documents

Servers

Customer information

Network equipment

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a DoS attack aim to do?

Steal personal information

Infect computers with malware

Disable server functions

Create confusion among users

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is used to prevent unauthorized access to a network?

Biometric authentication

Data backup

Data encryption

Social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common motivation for cybercriminals?

Educational purposes

Environmental concerns

Personal revenge

Community service

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of backup captures only the data changed since the last backup?

Cloud Backup

Differential Backup

Incremental Backup

Full Backup

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A method to secure data

A backup strategy

A type of computer virus

An attempt to obtain personal information via email

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?