AEIC 326 Topic 1: Review - Computer Security Quiz

AEIC 326 Topic 1: Review - Computer Security Quiz

University

25 Qs

quiz-placeholder

Similar activities

Computer Science Concepts

Computer Science Concepts

8th Grade - University

20 Qs

ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

University

20 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

T Level Digital Security Revision

T Level Digital Security Revision

11th Grade - University

24 Qs

Cybersecurity

Cybersecurity

10th Grade - University

20 Qs

Information and Communication Technology Security - Pre-Test

Information and Communication Technology Security - Pre-Test

University

20 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

AEIC 326 Topic 1: Review - Computer Security Quiz

AEIC 326 Topic 1: Review - Computer Security Quiz

Assessment

Quiz

Computers

University

Easy

Created by

Jeffrey Garrido

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following best explains why modern businesses are increasingly vulnerable to security threats?

The interconnection of systems through communication networks

The exclusive use of local storage systems

The decrease in digital data storage

The limited number of access point

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A company experiences an attack where hackers overwhelm their servers with thousands of simultaneous requests. This is an example of:

Pharming

Spoofing

Denial-of-Service (DoS) attack

Rootkit installation

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What makes worms potentially more dangerous than traditional viruses?

They require human interaction to spread

They can operate independently without host programs

They only affect email systems

They can't cross network boundaries

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In the context of wireless security, what is the primary risk of "wardiving"?

Physical damage to wireless equipment

Interception of network traffic

Installation of hardware keyloggers

Corruption of SSID databases

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which security threat combines psychological manipulation with technical exploitation?

Social Engineering

Keylogging

Spyware

Adware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A program appears to be a legitimate software update but contains malicious code. This is best classified as:

A worm

A virus

A Trojan horse

Ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What distinguishes pharming from phishing attacks?

Pharming requires no user interaction to redirect to fake websites

Pharming only affects email communications

Pharming cannot steal personal information

Pharming only targets banking websites

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?