FINAL EXAM

FINAL EXAM

University

50 Qs

quiz-placeholder

Similar activities

STS INFORMATIKA GENAP 2024-2025

STS INFORMATIKA GENAP 2024-2025

9th Grade - University

50 Qs

Midterm Examination In ICT BSME 2A-2F

Midterm Examination In ICT BSME 2A-2F

University

50 Qs

Inter-VLAN Routing  Control Access

Inter-VLAN Routing Control Access

11th Grade - University

50 Qs

IT221-FINAL-REVIEWER

IT221-FINAL-REVIEWER

University

50 Qs

INFORMATIKA

INFORMATIKA

10th Grade - University

50 Qs

Ôn tập HKI Tin học 12

Ôn tập HKI Tin học 12

12th Grade - University

50 Qs

INFORMATIKA 2526-S1

INFORMATIKA 2526-S1

9th Grade - University

50 Qs

Penilaian Harian Kelas 7D

Penilaian Harian Kelas 7D

7th Grade - University

50 Qs

FINAL EXAM

FINAL EXAM

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Mark Feguro

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A guest user accessing an administrator modules without permission is an example of what?

A malware attack

Unauthorized access

A data breach

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary preventative measure against data breaches?

Shredding physical documents


Conducting background checks on employees

Using strong passwords

Encrypting sensitive data and using firewalls

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ransomware attack that locks files and demands a payment is categorized as a:

Denial of Service (DoS) attack

Malware attack

Data tampering

VIrus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key strategy to prevent phishing and social engineering attacks?


Installing and updating antivirus software


Using firewalls and anti-DDoS services

Educating individuals to recognize suspicious emails and behavior.


Encrypting sensitive data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Flooding a website with traffic to make it inaccessible to legitimate users is known as what type of attack?

Phishing


Denial of Service (DoS/DDoS) attack

Insider Threat

Malware Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee copying sensitive files to a personal USB drive is an example of an:

Network security


Insider threat

Data protection
File transfer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using checksums, hashing, and digital signatures is a method to prevent:

Data encryption and secure storage.

Data tampering

User authentication and access control.
Data backup and recovery processes.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?