
Types of Information Security Violations (GROUP 2)
Authored by Mark Feguro
Information Technology (IT)
University
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
A guest user accessing an administrator modules without permission is an example of what?
A malware attack
A data breach
Unauthorized access
Phishing
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is a primary preventative measure against data breaches?
Shredding physical documents
Encrypting sensitive data and using firewalls
Conducting background checks on employees
Using strong passwords
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
A ransomware attack that locks files and demands a payment is categorized as a:
Denial of Service (DoS) attack
Malware attack
Physical security violation
Data tampering
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is a key strategy to prevent phishing and social engineering attacks?
Installing and updating antivirus software
Using firewalls and anti-DDoS services
Educating individuals to recognize suspicious emails and behavior.
Encrypting sensitive data
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Flooding a website with traffic to make it inaccessible to legitimate users is known as what type of attack?
Phishing
Malware attack
Denial of Service (DoS/DDoS) attack
Insider threat
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
An employee copying sensitive files to a personal USB drive is an example of an:
Insider threat
Unpatched software vulnerability
Improper disposal of data
Unauthorized access attempt
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Using checksums, hashing, and digital signatures is a method to prevent:
Phishing attacks
Data tampering
Malware infections
Physical security violations
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Cloud Service Models & Software Process Models
Quiz
•
2nd Grade - University
11 questions
Posttest Keamanan Digital
Quiz
•
University
10 questions
học Quản Trị Tri Thức chưa người đẹp??
Quiz
•
University
15 questions
FOS Part 2 (QUIZ 2)
Quiz
•
University
20 questions
Quizz Informatika Analisis Data Kelas 9
Quiz
•
9th Grade - University
20 questions
Soal STS TIK Kelas 5 Semester 2
Quiz
•
5th Grade - University
20 questions
NET102: Quiz No. 1
Quiz
•
University
20 questions
IT for Managers M1
Quiz
•
University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Information Technology (IT)
20 questions
Disney Trivia
Quiz
•
University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
14 questions
Ch.3_TEACHER-led
Quiz
•
University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University