Tech+  6.0 Security

Tech+ 6.0 Security

11th - 12th Grade

26 Qs

quiz-placeholder

Similar activities

Social Engineering and Malware

Social Engineering and Malware

8th - 11th Grade

25 Qs

U1 Assessment - Cyber

U1 Assessment - Cyber

12th Grade

26 Qs

PLTW Cybersecurity

PLTW Cybersecurity

9th - 12th Grade

23 Qs

Security & Authentication in ITGS

Security & Authentication in ITGS

10th - 12th Grade

21 Qs

Security

Security

12th Grade - Professional Development

24 Qs

[AP CSP] Types of Malware

[AP CSP] Types of Malware

9th - 12th Grade

25 Qs

Cyber security

Cyber security

12th Grade

25 Qs

Identifying Security Threats

Identifying Security Threats

9th - 12th Grade

21 Qs

Tech+  6.0 Security

Tech+ 6.0 Security

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Created by

Jonathan Rilley

Used 245+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can copy itself and infect a computer without the user's consent or knowledge?
virus
Trojan horse
rootkit
backdoor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of self-replicating program copies itself to other computers on a network without any user intervention and consumes bandwidth and computer resources?
virus
Trojan horse
worm
backdoor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique is used to send you to a fake, but realistic-looking, website to verify your account information?
spoofing
smurfing
man-in-the-middle
phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______ is software that is designed to infiltrate or affect a computer system without the owner's informed consent.
backdoor
buffer overflow
malware
spyware

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two types of attacks are at least some what thwarted with the use of the account lockout policy?

Dictionary attack

Brute Force attack

Denial-of-Service attack

Buffer Overflow

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What provides secure access to a network over the Internet?

NAT

VPN

NIP

NAP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an authentication method that identifies individuals based on physical characteristics such as fingerprints, facial recognition, retina scans, or voice patterns?

RADIUS

Dictionary attack

Biometrics

Brute Force Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?