Search Header Logo

Digital Security Risks and Ethics

Authored by Wayground Content

Computers

University

Used 6+ times

Digital Security Risks and Ethics
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a denial of service attack (DoS attack)?

A method to enhance computer security.

A disruption of computer access to Internet services.

A technique to improve network performance.

A way to increase data storage capacity.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is digital forensics?

Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks.

Digital forensics is the process of creating digital art using software tools.

Digital forensics involves the study of digital marketing strategies.

Digital forensics is the analysis of social media trends and their impact.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is wireless security?

A method to enhance internet speed

Measures taken to protect a wireless network from unauthorized access or damage

A type of encryption for wired networks

A protocol for connecting devices via Bluetooth

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering?

A method of improving social skills and networking.

A technique used to gain unauthorized access to confidential information by exploiting human trust.

A strategy for enhancing team collaboration and communication.

A form of psychological manipulation to influence people's decisions.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is software theft?

Software theft occurs when someone illegally copies, distributes, or uses software without proper authorization.

Software theft is the process of creating new software applications.

Software theft refers to the unauthorized sale of hardware components.

Software theft is when software is used for educational purposes without permission.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spoofing?

A technique used by intruders to make their network or Internet transmission appear legitimate.

A method for securing data transmission over the Internet.

A type of malware that infects computers.

A process of encrypting data to protect it from unauthorized access.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is information privacy?

The ability to access any information freely without restrictions.

The right of individuals and companies to deny or restrict the collection and use of information about them.

A legal term that allows companies to share personal data without consent.

The process of encrypting data to protect it from unauthorized access.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?