Chapter 9: Information Security & Ethics Quiz

Chapter 9: Information Security & Ethics Quiz

University

10 Qs

quiz-placeholder

Similar activities

Forum Activity Tech quiz

Forum Activity Tech quiz

University

15 Qs

1ro B Preguntas sobre IA y Prompts

1ro B Preguntas sobre IA y Prompts

1st Grade - University

10 Qs

ASSESSING HARDWARE

ASSESSING HARDWARE

University

10 Qs

MAD Unit 5 T1

MAD Unit 5 T1

University

10 Qs

Transformação Digital

Transformação Digital

University

12 Qs

PPL 223 - (QUIZ 3) Data Types and Structures

PPL 223 - (QUIZ 3) Data Types and Structures

University

15 Qs

CSS222 Q01

CSS222 Q01

University

10 Qs

Borders and Shades in Word 2010 Quiz

Borders and Shades in Word 2010 Quiz

10th Grade - University

12 Qs

Chapter 9: Information Security & Ethics Quiz

Chapter 9: Information Security & Ethics Quiz

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Elly Erlina

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a major factor contributing to the increasing vulnerability of information resources?

Increased computer skills

Limited access to technology

Interconnected business environments

High management support

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering?

A hacker stealing data through malware

A virus infecting a computer system

A user accidentally deleting important files

An employee giving their password to someone claiming to be IT support

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves unauthorized access to information?

Identity theft

Human error

Social engineering

Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of deliberate software attack?

Phishing

Human error

Cyberterrorism

Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of access controls in information security?

To encrypt data during transmission

To restrict unauthorized access to information resources

To monitor employee behavior

To create backups of data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a physical control?

Firewalls

Passwords

Locks and guards

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does encryption do?

Prevents unauthorized access

Converts data into a readable format

Converts data into a form that cannot be read without a key

Monitors network traffic

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?