POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

7th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Introduction to Cybersecurity

Introduction to Cybersecurity

11th - 12th Grade

20 Qs

Review ( Security )

Review ( Security )

12th Grade

16 Qs

Unit 6 - Information Security Test Review

Unit 6 - Information Security Test Review

8th Grade

22 Qs

Cybersecurity Security MTA

Cybersecurity Security MTA

9th - 12th Grade

20 Qs

Data Security & Data Integrity

Data Security & Data Integrity

10th - 11th Grade

21 Qs

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

9th - 12th Grade

16 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

PLTW Cybersecurity

PLTW Cybersecurity

11th - 12th Grade

20 Qs

POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

Assessment

Quiz

Computers

7th - 12th Grade

Hard

Created by

Renee Bajor

Used 33+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A guessed password affects which basic principle of a company's security?

Confidentiality

Safety

Availability

Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Windows 7 machine used by the receptionist did not get the latest security patches, and a known vulnerability was exploited. Which business security domain should have addressed this issue?

LAN

Workstation

Server

WAN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following presents a threat to the network>

An unpatched computer.

A computer infected with a root kit.

The sales manager's use of a weak password.

Files are not protected with a password.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The data on a server is encrypted from a ______________ threat. This affects the ________________ principle.

ransomware; confidentiality

worm; availability

ransomware; availability

root kit; integrity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of malware spreads through an open network port.

Trojan horse

Worm

Root kit

Polymorphic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which situation leaves you most vulnerable to malware infections?

Installing purchased software from a DVD.

Surfing the Internet on mobile devices.

Exchanging messages through a social media app.

Using a flash drive on multiple machines.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bug-bounty programs are especially useful against which of the following?

Ransomware attacks

Zero-day vulnerabilities

Keyloggers

Malicious cookies

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?