CSP 10-7 Security Risks

CSP 10-7 Security Risks

9th - 11th Grade

8 Qs

quiz-placeholder

Similar activities

Asesmen Diagnostik Informatika XI

Asesmen Diagnostik Informatika XI

10th Grade

10 Qs

História e Evolução Sistemas Operativos Servidor

História e Evolução Sistemas Operativos Servidor

11th Grade

10 Qs

TRẮC NGHIỆM TIN 12 KỲ II

TRẮC NGHIỆM TIN 12 KỲ II

10th - 12th Grade

10 Qs

Bài làm việc Access, cấu trúc bảng

Bài làm việc Access, cấu trúc bảng

9th - 12th Grade

10 Qs

Computer Security

Computer Security

8th - 10th Grade

10 Qs

paquetes contables  lección 1

paquetes contables lección 1

11th Grade - Professional Development

10 Qs

Testas: Saugesnis internetas

Testas: Saugesnis internetas

11th Grade

10 Qs

Latihan Sistem Komputer

Latihan Sistem Komputer

10th Grade

10 Qs

CSP 10-7 Security Risks

CSP 10-7 Security Risks

Assessment

Quiz

Computers

9th - 11th Grade

Practice Problem

Medium

Created by

Linda Henneberg

Used 23+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A wireless access point that gives unauthorized access to secure networks.

Phishing

Virus

Malware

Rogue Access Point

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program that can copy itself and gain access to a computer in an unauthorized way.

Phishing

Keylogger

Malware

Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Freeware or shareware can be trusted to be free of all malware.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious links can show up in an email message.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of a program to record every keystroke made by a computer user, in order to gain fraudulent access

Keylogging

Rogue Access Point

Phishing

Malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique used to trick a user into providing personal information.

Keylogging

Virus

Malware

Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data sent over public networks can be intercepted, analyzed and modified. One way that this can happen is through...

Rogue Access Point

Keylogging

Phishing

Permissions

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?