FINAL EXAM

FINAL EXAM

University

50 Qs

quiz-placeholder

Similar activities

Selamat mengerjakan

Selamat mengerjakan

10th Grade - University

50 Qs

Latihan Soal SAS Kelas 2

Latihan Soal SAS Kelas 2

2nd Grade - University

45 Qs

Disruptive Technology Quiz

Disruptive Technology Quiz

University

50 Qs

PAS kls 7 Genap 2024-2025

PAS kls 7 Genap 2024-2025

7th Grade - University

52 Qs

LQ#2_IS101 (Fundamentals of Information Systems)

LQ#2_IS101 (Fundamentals of Information Systems)

University

50 Qs

ARQUITECTURA 2-2025

ARQUITECTURA 2-2025

University

50 Qs

PTS Informatika Ganjil kelas 9

PTS Informatika Ganjil kelas 9

9th Grade - University

50 Qs

FHCI Quiz 02

FHCI Quiz 02

University

50 Qs

FINAL EXAM

FINAL EXAM

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Mark Feguro

Used 4+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A guest user accessing an administrator modules without permission is an example of what?

A malware attack

Unauthorized access

A data breach

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary preventative measure against data breaches?

Shredding physical documents


Conducting background checks on employees

Using strong passwords

Encrypting sensitive data and using firewalls

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ransomware attack that locks files and demands a payment is categorized as a:

Denial of Service (DoS) attack

Malware attack

Data tampering

VIrus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key strategy to prevent phishing and social engineering attacks?


Installing and updating antivirus software


Using firewalls and anti-DDoS services

Educating individuals to recognize suspicious emails and behavior.


Encrypting sensitive data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Flooding a website with traffic to make it inaccessible to legitimate users is known as what type of attack?

Phishing


Denial of Service (DoS/DDoS) attack

Insider Threat

Malware Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee copying sensitive files to a personal USB drive is an example of an:

Network security


Insider threat

Data protection
File transfer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using checksums, hashing, and digital signatures is a method to prevent:

Data encryption and secure storage.

Data tampering

User authentication and access control.
Data backup and recovery processes.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?