AEIC 326 Topic 1: Review - Computer Security Quiz

AEIC 326 Topic 1: Review - Computer Security Quiz

University

25 Qs

quiz-placeholder

Similar activities

Asesmen DSI Kelas 9

Asesmen DSI Kelas 9

9th Grade - University

25 Qs

Topic 7 CFD1313

Topic 7 CFD1313

University

20 Qs

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

University

24 Qs

Day 10 - Networking & Security I - Day 10 - 2nd Review

Day 10 - Networking & Security I - Day 10 - 2nd Review

University

20 Qs

Revision for Chapter 3

Revision for Chapter 3

University

24 Qs

CYBERSECURITY QUIZ

CYBERSECURITY QUIZ

University

25 Qs

Mock test 1 study

Mock test 1 study

University

21 Qs

CSC098 - Kuiz Chapter 12

CSC098 - Kuiz Chapter 12

University

23 Qs

AEIC 326 Topic 1: Review - Computer Security Quiz

AEIC 326 Topic 1: Review - Computer Security Quiz

Assessment

Quiz

Computers

University

Easy

Created by

Jeffrey Garrido

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following best explains why modern businesses are increasingly vulnerable to security threats?

The interconnection of systems through communication networks

The exclusive use of local storage systems

The decrease in digital data storage

The limited number of access point

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A company experiences an attack where hackers overwhelm their servers with thousands of simultaneous requests. This is an example of:

Pharming

Spoofing

Denial-of-Service (DoS) attack

Rootkit installation

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What makes worms potentially more dangerous than traditional viruses?

They require human interaction to spread

They can operate independently without host programs

They only affect email systems

They can't cross network boundaries

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In the context of wireless security, what is the primary risk of "wardiving"?

Physical damage to wireless equipment

Interception of network traffic

Installation of hardware keyloggers

Corruption of SSID databases

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which security threat combines psychological manipulation with technical exploitation?

Social Engineering

Keylogging

Spyware

Adware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A program appears to be a legitimate software update but contains malicious code. This is best classified as:

A worm

A virus

A Trojan horse

Ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What distinguishes pharming from phishing attacks?

Pharming requires no user interaction to redirect to fake websites

Pharming only affects email communications

Pharming cannot steal personal information

Pharming only targets banking websites

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?