
J277 - 1.4 - Network Threats
Authored by R Eveleigh
Computers
10th Grade
Used 23+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is data interception in the context of network threats?
A method of encrypting data to protect it from hackers.
Capturing data as it travels across a network.
A technique to speed up data transmission.
A way to store data securely on a server.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a technique used by hackers to intercept data?
Data encryption
Packet sniffing
Firewall installation
Data compression
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a man-in-the-middle attack?
A method of encrypting data between two parties.
A hacker positioning themselves between two communicating parties to intercept data.
A technique to speed up data transmission.
A way to store data securely on a server.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are potential consequences of data interception and theft?
Faster internet speeds
Identity theft, financial loss, privacy breaches
Improved data security
Increased storage capacity
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Denial of Service (DoS) attack?
A method to enhance server performance.
Overwhelming a network or server with requests to make it inaccessible.
A technique to encrypt data.
A way to improve data transmission speed.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do hackers execute a Denial of Service (DoS) attack?
By encrypting all data on the server.
By overwhelming a network or server with a huge volume of requests.
By installing a firewall.
By compressing data to reduce server load.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common consequence of a Denial of Service (DoS) attack?
Enhanced data security
Disruption of service
Increased server speed
Improved data encryption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?