ITEC100 QUIZ 2 AKJHG11AA

ITEC100 QUIZ 2 AKJHG11AA

University

15 Qs

quiz-placeholder

Similar activities

Cyber Security Awareness Quiz

Cyber Security Awareness Quiz

University

10 Qs

Emerging Technologies

Emerging Technologies

University

20 Qs

Level 2 Digital Technologies

Level 2 Digital Technologies

8th Grade - Professional Development

18 Qs

Online Learning

Online Learning

University

10 Qs

A test of CALL (computer assisted language learning )

A test of CALL (computer assisted language learning )

University - Professional Development

15 Qs

จริยธรรมและกฎหมายคอมพิวเตอร์

จริยธรรมและกฎหมายคอมพิวเตอร์

University

20 Qs

MOODLE LMS

MOODLE LMS

10th Grade - Professional Development

20 Qs

IT01 CHAPTER 1

IT01 CHAPTER 1

University

20 Qs

ITEC100 QUIZ 2 AKJHG11AA

ITEC100 QUIZ 2 AKJHG11AA

Assessment

Quiz

Instructional Technology

University

Practice Problem

Easy

Created by

Jose Velasquez

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company employee receives email requesting login credentials to verify their account. The email appears to be from the IT department but is actually a scam. What type of attack is this?

Brute Force Attack

Phishing Attack

Man-in-the-Middle Attack

Ransomware Attack

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hospital's patient records system is encrypted by an unknown hacker who demands payment to unlock the data. What type of attack is this?

Spyware

Adware

Ransomware

Rootkit

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user installs a program that appears to be a free antivirus but secretly records their keystrokes. What type of malware is this?

Phishing

Keylogger

Social Engineering

Spyware

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hacker sends thousands of connection requests to a server, overwhelming it and causing it to crash. What type of attack is this?

Phishing Attack

Denial-of-Service (DoS) Attack

Spyware Attack

Man-in-the-Middle Attack

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What cybersecurity measure ensures that data is accessible when needed?

Confidentiality

Integrity

Availability

Encryption

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hacker injects malicious SQL commands into a login form to gain unauthorized access to a database. What type of attack is this?

Phishing

Cross-Site Scripting

SQL Injection

Code Injection

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What method enhances password security?

Using simple passwords for easier recall

Writing down passwords

Using two-factor authentication

Sharing passwords with coworkers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?