Chapter 9: Information Security & Ethics Quiz

Chapter 9: Information Security & Ethics Quiz

University

10 Qs

quiz-placeholder

Similar activities

3.1(a)(b) - Lecture

3.1(a)(b) - Lecture

University

15 Qs

ICT and Multimedia Quiz

ICT and Multimedia Quiz

12th Grade - University

14 Qs

IT Quiz Bee 2025 - AVERAGE

IT Quiz Bee 2025 - AVERAGE

University

10 Qs

Q6. Cybersecurity Best Practices

Q6. Cybersecurity Best Practices

University

15 Qs

MS Access

MS Access

University

15 Qs

CLC Lesson 4&5 Quiz

CLC Lesson 4&5 Quiz

University

12 Qs

Test

Test

University

15 Qs

Chapter 9: Information Security & Ethics Quiz

Chapter 9: Information Security & Ethics Quiz

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Elly Erlina

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a major factor contributing to the increasing vulnerability of information resources?

Increased computer skills

Limited access to technology

Interconnected business environments

High management support

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering?

A hacker stealing data through malware

A virus infecting a computer system

A user accidentally deleting important files

An employee giving their password to someone claiming to be IT support

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves unauthorized access to information?

Identity theft

Human error

Social engineering

Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of deliberate software attack?

Phishing

Human error

Cyberterrorism

Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of access controls in information security?

To encrypt data during transmission

To restrict unauthorized access to information resources

To monitor employee behavior

To create backups of data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a physical control?

Firewalls

Passwords

Locks and guards

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does encryption do?

Prevents unauthorized access

Converts data into a readable format

Converts data into a form that cannot be read without a key

Monitors network traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?