Types of Information Security Violations

Types of Information Security Violations

University

15 Qs

quiz-placeholder

Similar activities

NISS-DC-Quiz

NISS-DC-Quiz

University

15 Qs

Jenis dan Dampak Malware Informatika Kelas 9

Jenis dan Dampak Malware Informatika Kelas 9

9th Grade - University

20 Qs

LINKS Cyber Youth Challenge - Round 1

LINKS Cyber Youth Challenge - Round 1

University

10 Qs

Domain 4 - Network Security

Domain 4 - Network Security

10th Grade - University

16 Qs

Q5. Ethical Issues in information technology

Q5. Ethical Issues in information technology

University

20 Qs

Security Fundamental

Security Fundamental

University

20 Qs

SEGi College Engagement with SAINS

SEGi College Engagement with SAINS

University

10 Qs

Living in the IT Era: Knowledge Assessment

Living in the IT Era: Knowledge Assessment

University

16 Qs

Types of Information Security Violations

Types of Information Security Violations

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Mark Feguro

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A guest user accessing an administrator modules without permission is an example of what?

A malware attack

A data breach

Unauthorized access

Phishing

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a primary preventative measure against data breaches?

Shredding physical documents

Encrypting sensitive data and using firewalls

Conducting background checks on employees

Using strong passwords

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A ransomware attack that locks files and demands a payment is categorized as a:

Denial of Service (DoS) attack

Malware attack

Physical security violation

Data tampering

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is a key strategy to prevent phishing and social engineering attacks?

Installing and updating antivirus software

Using firewalls and anti-DDoS services

Educating individuals to recognize suspicious emails and behavior.

Encrypting sensitive data

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Flooding a website with traffic to make it inaccessible to legitimate users is known as what type of attack?

Phishing

Malware attack

Denial of Service (DoS/DDoS) attack

Insider threat

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

An employee copying sensitive files to a personal USB drive is an example of an:

Insider threat

Unpatched software vulnerability

Improper disposal of data

Unauthorized access attempt

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Using checksums, hashing, and digital signatures is a method to prevent:

Phishing attacks

Data tampering

Malware infections

Physical security violations

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)