Digital Security Risks and Ethics

Digital Security Risks and Ethics

University

20 Qs

quiz-placeholder

Similar activities

икт на конец то бытты

икт на конец то бытты

University

23 Qs

Computer Software

Computer Software

6th Grade - University

25 Qs

Basics of Computer

Basics of Computer

University

15 Qs

Computer Components Intro Quiz

Computer Components Intro Quiz

9th Grade - University

20 Qs

Basics of Computers

Basics of Computers

University

20 Qs

AIS160 Chapter 4: Communication and Network

AIS160 Chapter 4: Communication and Network

University

20 Qs

MODULE 1: Introduction to the concepts of ICT

MODULE 1: Introduction to the concepts of ICT

University

15 Qs

OPERATING SYSTEMS

OPERATING SYSTEMS

University

20 Qs

Digital Security Risks and Ethics

Digital Security Risks and Ethics

Assessment

Quiz

Computers

University

Medium

Created by

Quizizz Content

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a denial of service attack (DoS attack)?

A method to enhance computer security.

A disruption of computer access to Internet services.

A technique to improve network performance.

A way to increase data storage capacity.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is digital forensics?

Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks.

Digital forensics is the process of creating digital art using software tools.

Digital forensics involves the study of digital marketing strategies.

Digital forensics is the analysis of social media trends and their impact.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is wireless security?

A method to enhance internet speed

Measures taken to protect a wireless network from unauthorized access or damage

A type of encryption for wired networks

A protocol for connecting devices via Bluetooth

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering?

A method of improving social skills and networking.

A technique used to gain unauthorized access to confidential information by exploiting human trust.

A strategy for enhancing team collaboration and communication.

A form of psychological manipulation to influence people's decisions.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is software theft?

Software theft occurs when someone illegally copies, distributes, or uses software without proper authorization.

Software theft is the process of creating new software applications.

Software theft refers to the unauthorized sale of hardware components.

Software theft is when software is used for educational purposes without permission.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spoofing?

A technique used by intruders to make their network or Internet transmission appear legitimate.

A method for securing data transmission over the Internet.

A type of malware that infects computers.

A process of encrypting data to protect it from unauthorized access.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is information privacy?

The ability to access any information freely without restrictions.

The right of individuals and companies to deny or restrict the collection and use of information about them.

A legal term that allows companies to share personal data without consent.

The process of encrypting data to protect it from unauthorized access.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?