untitled

untitled

10th Grade

11 Qs

quiz-placeholder

Similar activities

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

Quiz 9 (15.09.2021)

Quiz 9 (15.09.2021)

1st - 12th Grade

10 Qs

HTML TABLE BASIC

HTML TABLE BASIC

10th Grade

10 Qs

Round 2 for Preplacement Bootcamp

Round 2 for Preplacement Bootcamp

University

15 Qs

Internet

Internet

University

11 Qs

have fun with econometrics

have fun with econometrics

University

15 Qs

PSSI Chp 1 dan 2

PSSI Chp 1 dan 2

University

12 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

untitled

untitled

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Geraldine Magloire

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It helps keep data and equipment safe by giving only the appropriate people access.

network security
firewall
antivirus
security threats

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an employee intends to cause damage 

Malicious Threats
Accidental Threats
Data Security Attacks
Physical Security Attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the user damages data or equipment unintentionally

Malicious Threats
Accidental Threats
Physical Security Threats
Data Security Threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Events or attacks that steal, damage, or destroy equipments.

Malicious Threats
Accidental Threats
Data Security Threats
Physical Security Threats

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.

Malicious Threats
Accidental Threats
Data Security Attacks
Physical Security Attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It uses available resources, such as passwords or scripts.

Accidental Threats
Malicious Threats
Structured Attacks
Unstructured Attacks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It uses code to access operating systems and software.

Structured Attacks
Unstructured Attacks
Malicious Threats
Accidental Threats

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers