ITEC100 QUIZ 2 AKJHG11AA

ITEC100 QUIZ 2 AKJHG11AA

University

15 Qs

quiz-placeholder

Similar activities

Awesome April

Awesome April

University

15 Qs

Security Chapter 1 Vocab Review

Security Chapter 1 Vocab Review

11th Grade - University

10 Qs

BCS Network Security Test 2

BCS Network Security Test 2

University - Professional Development

18 Qs

Digital Mindfulness

Digital Mindfulness

University

10 Qs

Assessment # 1-  Information Assurance and Security 1

Assessment # 1- Information Assurance and Security 1

University

15 Qs

CYBER ADDA

CYBER ADDA

University

15 Qs

Cyber Security Awareness Quiz

Cyber Security Awareness Quiz

University

10 Qs

NUEVAS TICs

NUEVAS TICs

University

19 Qs

ITEC100 QUIZ 2 AKJHG11AA

ITEC100 QUIZ 2 AKJHG11AA

Assessment

Quiz

Instructional Technology

University

Easy

Created by

Jose Velasquez

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company employee receives email requesting login credentials to verify their account. The email appears to be from the IT department but is actually a scam. What type of attack is this?

Brute Force Attack

Phishing Attack

Man-in-the-Middle Attack

Ransomware Attack

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hospital's patient records system is encrypted by an unknown hacker who demands payment to unlock the data. What type of attack is this?

Spyware

Adware

Ransomware

Rootkit

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user installs a program that appears to be a free antivirus but secretly records their keystrokes. What type of malware is this?

Phishing

Keylogger

Social Engineering

Spyware

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hacker sends thousands of connection requests to a server, overwhelming it and causing it to crash. What type of attack is this?

Phishing Attack

Denial-of-Service (DoS) Attack

Spyware Attack

Man-in-the-Middle Attack

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What cybersecurity measure ensures that data is accessible when needed?

Confidentiality

Integrity

Availability

Encryption

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hacker injects malicious SQL commands into a login form to gain unauthorized access to a database. What type of attack is this?

Phishing

Cross-Site Scripting

SQL Injection

Code Injection

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What method enhances password security?

Using simple passwords for easier recall

Writing down passwords

Using two-factor authentication

Sharing passwords with coworkers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?