2.0 Threats, Vulnerabilities, and Mitigations

2.0 Threats, Vulnerabilities, and Mitigations

10th Grade

20 Qs

quiz-placeholder

Similar activities

Economic Systems Review

Economic Systems Review

7th - 12th Grade

20 Qs

Chapter 1, Lesson 1: Functions of Government

Chapter 1, Lesson 1: Functions of Government

9th - 12th Grade

15 Qs

Globalization and Post-9/11: OLS 31-33

Globalization and Post-9/11: OLS 31-33

9th - 10th Grade

15 Qs

Spare Parts

Spare Parts

9th - 12th Grade

15 Qs

Economic Systems

Economic Systems

9th - 12th Grade

20 Qs

Career Clusters

Career Clusters

10th Grade - University

15 Qs

Foreign Policy

Foreign Policy

9th - 12th Grade

16 Qs

Making a Living

Making a Living

6th Grade - University

15 Qs

2.0 Threats, Vulnerabilities, and Mitigations

2.0 Threats, Vulnerabilities, and Mitigations

Assessment

Quiz

Social Studies

10th Grade

Hard

Created by

Quizizz Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware

Software that serves a malicious purpose, typically installed without the user's consent (or knowledge).

A type of software that enhances system performance and security.

An application designed to improve user productivity and efficiency.

A program that helps in managing computer hardware resources.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Worm

A type of malware that replicates between processes in system memory and can spread over client/server network connections.

A type of software that helps in managing system resources.

A program that is designed to harm or exploit any programmable device or network.

A tool used for data recovery and backup.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Blackmail

Demanding payment to prevent the release of information.

Offering a reward for information.

Requesting payment for a service rendered.

Threatening to disclose personal secrets for money.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Typosquatting

An attack where an attacker registers a domain name with a common misspelling of an existing domain.

A method of phishing that involves sending emails with fake links.

A technique used to improve website SEO by using popular keywords.

A form of malware that infects a user's computer through a web browser.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unskilled attacker

A highly skilled hacker who creates their own tools.

An inexperienced attacker that typically uses tools or scripts created by others.

A professional security consultant who tests systems for vulnerabilities.

A government agent conducting surveillance on cybercriminals.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unintentional or inadvertent insider threat

A threat actor that causes a vulnerability or exposes an attack vector without malicious intent.

A malicious insider who intentionally leaks sensitive information.

An external hacker attempting to breach a system.

A software bug that creates security vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware

Software that records information about a PC and its users, often installed without the user's consent.

A type of antivirus software that protects against malware.

A program that speeds up computer performance by cleaning up files.

A tool used for monitoring network traffic and performance.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?