
Digital Security Risks and Ethics
Authored by Wayground Content
Computers
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a denial of service attack (DoS attack)?
A method to enhance computer security.
A disruption of computer access to Internet services.
A technique to improve network performance.
A way to increase data storage capacity.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is digital forensics?
Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks.
Digital forensics is the process of creating digital art using software tools.
Digital forensics involves the study of digital marketing strategies.
Digital forensics is the analysis of social media trends and their impact.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is wireless security?
A method to enhance internet speed
Measures taken to protect a wireless network from unauthorized access or damage
A type of encryption for wired networks
A protocol for connecting devices via Bluetooth
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is social engineering?
A method of improving social skills and networking.
A technique used to gain unauthorized access to confidential information by exploiting human trust.
A strategy for enhancing team collaboration and communication.
A form of psychological manipulation to influence people's decisions.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is software theft?
Software theft occurs when someone illegally copies, distributes, or uses software without proper authorization.
Software theft is the process of creating new software applications.
Software theft refers to the unauthorized sale of hardware components.
Software theft is when software is used for educational purposes without permission.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is spoofing?
A technique used by intruders to make their network or Internet transmission appear legitimate.
A method for securing data transmission over the Internet.
A type of malware that infects computers.
A process of encrypting data to protect it from unauthorized access.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is information privacy?
The ability to access any information freely without restrictions.
The right of individuals and companies to deny or restrict the collection and use of information about them.
A legal term that allows companies to share personal data without consent.
The process of encrypting data to protect it from unauthorized access.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
18 questions
LỚP 12 - CHỦ ĐỀ B - BÀI 1 + 2 MẠNG MT VÀ GIAO THỨC
Quiz
•
10th Grade - University
15 questions
GIS Unit III
Quiz
•
University
20 questions
Fotogrametri dan Penginderaan Jauh
Quiz
•
University
20 questions
Quiz Harian Gdevelop MPK
Quiz
•
University
15 questions
Computer and Other Human Inventions
Quiz
•
University
15 questions
Robotics Prelim
Quiz
•
University
20 questions
Digital and Analog transmission
Quiz
•
University
20 questions
Soal AIJ bulan Agustus 2019 kls xii
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade