3.4G Internet dilemmas

3.4G Internet dilemmas

University

20 Qs

quiz-placeholder

Similar activities

HSMP 4200 Let's Test Our Knowledge Chp 8-15

HSMP 4200 Let's Test Our Knowledge Chp 8-15

University

20 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

Cyber Security Month 2019

Cyber Security Month 2019

KG - Professional Development

20 Qs

Cyber Hygiene

Cyber Hygiene

University

15 Qs

DASAR KOMPUTER DAN PEMOGRAMAN 1

DASAR KOMPUTER DAN PEMOGRAMAN 1

University

20 Qs

Easy BreezeIII

Easy BreezeIII

University

25 Qs

Data Owners/Subjects

Data Owners/Subjects

University

25 Qs

BCS Network Security Test 2

BCS Network Security Test 2

University - Professional Development

18 Qs

3.4G Internet dilemmas

3.4G Internet dilemmas

Assessment

Quiz

Education

University

Easy

Created by

Suryani Sulong

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is balancing accessibility and security important in workplace networks?

To increase the speed of internet

To allow hackers easier access

To ensure employees can work efficiently while protecting data

To avoid paying for antivirus software

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a social engineering attack?

Breaking into a computer through brute force

Manipulating someone to provide confidential information

Overloading a server with traffic

Infecting a system with a worm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the key vulnerability exploited in the WannaCry ransomware attack?

Unsecured emails

Unpatched Windows systems

Outdated antivirus software

Open Wi-Fi networks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes DDOS attacks effective in disrupting services?

They hack the database directly

They lock users out of their devices

They flood servers with overwhelming traffic

They send phishing emails to employees

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a consequence of internet anonymity?

Improved download speeds

Encouragement of open speech and trolling

Enhanced firewall protection

Better performance of IoT devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are spam emails still a threat despite filtering technologies?

They can bypass firewalls through brute force

They often come from secure institutions

Some are cleverly disguised and evade filters

Spam is no longer a threat

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack method was used in the Bangladesh Bank Hack?

DDOS attack

Phishing through a fake CV with a virus

Direct database breach

Hardware destruction

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?