AEIC 326 Topic 1: Review - Computer Security Quiz

AEIC 326 Topic 1: Review - Computer Security Quiz

University

25 Qs

quiz-placeholder

Similar activities

CNS_Semi-Final Quiz

CNS_Semi-Final Quiz

University

25 Qs

Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

University

20 Qs

KS3 Term 2 Revision

KS3 Term 2 Revision

8th Grade - University

28 Qs

NETWORK SECURITY

NETWORK SECURITY

University

20 Qs

LVTR M13 Internet of Things

LVTR M13 Internet of Things

University

20 Qs

threats and attack in networking

threats and attack in networking

University

20 Qs

FDM QUIZZ 5

FDM QUIZZ 5

University

20 Qs

Module 1.1: Common Threats

Module 1.1: Common Threats

11th Grade - University

25 Qs

AEIC 326 Topic 1: Review - Computer Security Quiz

AEIC 326 Topic 1: Review - Computer Security Quiz

Assessment

Quiz

Computers

University

Easy

Created by

Jeffrey Garrido

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following best explains why modern businesses are increasingly vulnerable to security threats?

The interconnection of systems through communication networks

The exclusive use of local storage systems

The decrease in digital data storage

The limited number of access point

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A company experiences an attack where hackers overwhelm their servers with thousands of simultaneous requests. This is an example of:

Pharming

Spoofing

Denial-of-Service (DoS) attack

Rootkit installation

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What makes worms potentially more dangerous than traditional viruses?

They require human interaction to spread

They can operate independently without host programs

They only affect email systems

They can't cross network boundaries

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In the context of wireless security, what is the primary risk of "wardiving"?

Physical damage to wireless equipment

Interception of network traffic

Installation of hardware keyloggers

Corruption of SSID databases

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which security threat combines psychological manipulation with technical exploitation?

Social Engineering

Keylogging

Spyware

Adware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A program appears to be a legitimate software update but contains malicious code. This is best classified as:

A worm

A virus

A Trojan horse

Ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What distinguishes pharming from phishing attacks?

Pharming requires no user interaction to redirect to fake websites

Pharming only affects email communications

Pharming cannot steal personal information

Pharming only targets banking websites

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?