untitled

untitled

10th Grade

11 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

12th Grade

10 Qs

Security Devices

Security Devices

10th Grade - University

7 Qs

Cisco 1, Module 16

Cisco 1, Module 16

University

15 Qs

L8: Network security Defence in Depth

L8: Network security Defence in Depth

University

10 Qs

What is Botnet Quiz

What is Botnet Quiz

10th Grade

7 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

Understanding Firewalls and Network Security

Understanding Firewalls and Network Security

11th Grade

10 Qs

Information Security Principles

Information Security Principles

University

10 Qs

untitled

untitled

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Geraldine Magloire

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It helps keep data and equipment safe by giving only the appropriate people access.
network security
firewall
antivirus
security threats

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an employee intends to cause damage 
Malicious Threats
Accidental Threats
Data Security Attacks
Physical Security Attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the user damages data or equipment unintentionally
Malicious Threats
Accidental Threats
Physical Security Threats
Data Security Threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Events or attacks that steal, damage, or destroy equipments.
Malicious Threats
Accidental Threats
Data Security Threats
Physical Security Threats

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
Malicious Threats
Accidental Threats
Data Security Attacks
Physical Security Attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It uses available resources, such as passwords or scripts.
Accidental Threats
Malicious Threats
Structured Attacks
Unstructured Attacks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It uses code to access operating systems and software.
Structured Attacks
Unstructured Attacks
Malicious Threats
Accidental Threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?