IAS 2 ITEC100 QUIZ

IAS 2 ITEC100 QUIZ

12th Grade

15 Qs

quiz-placeholder

Similar activities

ITGS 3.05: Security

ITGS 3.05: Security

9th - 12th Grade

10 Qs

Types of Attacks - Phishing

Types of Attacks - Phishing

9th - 12th Grade

10 Qs

Cybersecurity Review

Cybersecurity Review

12th Grade

19 Qs

Phishing Activity

Phishing Activity

6th - 12th Grade

14 Qs

M2 Social Engineering, Camb Nats

M2 Social Engineering, Camb Nats

9th - 12th Grade

12 Qs

Understanding Data Safety

Understanding Data Safety

8th Grade - University

15 Qs

QITC 13

QITC 13

1st Grade - Professional Development

20 Qs

SSL (Sak Senenge Lur)

SSL (Sak Senenge Lur)

12th Grade

10 Qs

IAS 2 ITEC100 QUIZ

IAS 2 ITEC100 QUIZ

Assessment

Quiz

Other

12th Grade

Hard

Created by

Jose Velasquez

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company employee receives email requesting login credentials to verify their account. The email appears to be from the IT department but is actually a scam. What type of attack is this?

Brute Force Attack

Phishing Attack

Man-in-the-Middle Attack

Ransomware Attack

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hospital's patient records system is encrypted by an unknown hacker who demands payment to unlock the data. What type of attack is this?

Spyware

Adware

Ransomware

Rootkit

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user installs a program that appears to be a free antivirus but secretly records their keystrokes. What type of malware is this?

Phishing

Keylogger

Social Engineering

Spyware

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hacker sends thousands of connection requests to a server, overwhelming it and causing it to crash. What type of attack is this?

Phishing Attack

Denial-of-Service (DoS) Attack

Spyware Attack

Man-in-the-Middle Attack

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What cybersecurity measure ensures that data is accessible when needed?

Confidentiality

Integrity

Availability

Encryption

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hacker injects malicious SQL commands into a login form to gain unauthorized access to a database. What type of attack is this?

Phishing

Cross-Site Scripting

SQL Injection

Code Injection

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What method enhances password security?

Using simple passwords for easier recall

Writing down passwords

Using two-factor authentication

Sharing passwords with coworkers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?