Search Header Logo

Quiz 2

Authored by Marivic Ramizares

Education

University

Used 1+ times

Quiz 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A person or organization that seeks to obtain or alter data illegally is called a:

Safeguard

Vulnerability

Threat

Target

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An opportunity for threats to gain access to assets is called a:

Firewall

Safeguard

Vulnerability

Encryption key

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A measure taken to block a threat is called a:

Threat

Vulnerability

Safeguard

Target

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT one of the three sources of threats?

Human Error

Computer Crime

Natural Events and Disasters

Market Fluctuations

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee who accidentally installs an old database on top of the current one is an example of:

Computer Crime

Natural Disaster

Human Error

Faulty Service

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hackers, virus writers, and terrorists fall under which threat category?

Human Error

Computer Crime

Natural Events and Disasters

Incorrect Data Modification

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Fires, floods, and earthquakes are examples of threats from:

Human Error

Computer Crime

Natural Events and Disasters

Denial of Service

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?