Search Header Logo

Types of Information Security Violations (GROUP 2)

Authored by Mark Feguro

Information Technology (IT)

University

Used 5+ times

Types of Information Security Violations (GROUP 2)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A guest user accessing an administrator modules without permission is an example of what?

A malware attack

A data breach

Unauthorized access

Phishing

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a primary preventative measure against data breaches?

Shredding physical documents

Encrypting sensitive data and using firewalls

Conducting background checks on employees

Using strong passwords

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A ransomware attack that locks files and demands a payment is categorized as a:

Denial of Service (DoS) attack

Malware attack

Physical security violation

Data tampering

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is a key strategy to prevent phishing and social engineering attacks?

Installing and updating antivirus software

Using firewalls and anti-DDoS services

Educating individuals to recognize suspicious emails and behavior.

Encrypting sensitive data

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Flooding a website with traffic to make it inaccessible to legitimate users is known as what type of attack?

Phishing

Malware attack

Denial of Service (DoS/DDoS) attack

Insider threat

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

An employee copying sensitive files to a personal USB drive is an example of an:

Insider threat

Unpatched software vulnerability

Improper disposal of data

Unauthorized access attempt

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Using checksums, hashing, and digital signatures is a method to prevent:

Phishing attacks

Data tampering

Malware infections

Physical security violations

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?