
FINAL EXAM
Authored by Mark Feguro
Information Technology (IT)
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A guest user accessing an administrator modules without permission is an example of what?
A malware attack
Unauthorized access
A data breach
Phishing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a primary preventative measure against data breaches?
Shredding physical documents
Conducting background checks on employees
Using strong passwords
Encrypting sensitive data and using firewalls
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ransomware attack that locks files and demands a payment is categorized as a:
Denial of Service (DoS) attack
Malware attack
Data tampering
VIrus
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key strategy to prevent phishing and social engineering attacks?
Installing and updating antivirus software
Using firewalls and anti-DDoS services
Educating individuals to recognize suspicious emails and behavior.
Encrypting sensitive data
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Flooding a website with traffic to make it inaccessible to legitimate users is known as what type of attack?
Phishing
Denial of Service (DoS/DDoS) attack
Insider Threat
Malware Attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee copying sensitive files to a personal USB drive is an example of an:
Insider threat
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Using checksums, hashing, and digital signatures is a method to prevent:
Data tampering
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?