Security

Security

10th Grade - Professional Development

34 Qs

quiz-placeholder

Similar activities

CIA Triad

CIA Triad

9th - 12th Grade

31 Qs

AP Computer Science Principles

AP Computer Science Principles

10th Grade

33 Qs

City and Guilds Award in Mobile and Operating System

City and Guilds Award in Mobile and Operating System

12th Grade - Professional Development

30 Qs

Network Security 3

Network Security 3

University

32 Qs

A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth

A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth

Professional Development

29 Qs

Cryptographic Cybersec

Cryptographic Cybersec

University

32 Qs

Cybersecurity Final Review Quizizz

Cybersecurity Final Review Quizizz

9th - 12th Grade

31 Qs

ITF - Chapter 14 Quiz

ITF - Chapter 14 Quiz

Professional Development

30 Qs

Security

Security

Assessment

Quiz

Computers

10th Grade - Professional Development

Medium

Used 5+ times

FREE Resource

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A DDoS attack can be best described as which of the following?
An attack carried out by flooding a server with spam data in order to keep it from handling valid requests.
A method of attacking a computer system by using packet sniffing.
Distributed denial of software attacks utilize SSL encryption and social engineering to subvert a company's security measures.
An attack that uses other computers to hack into the target system by using large amounts of data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TLS can be best defined as?
A protocol which is an upgrade to SSL and uses encryption to secure a communication channel between two parties.
A way to encrypt information that is to stored long term in data centers.
A method of communication which requires a share encryption key and the use of the SSL protocol.
A means by which a secure communication channel can be established within a local network only.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A broad term which describe many different types of malicious programs.
Malware
Viruses
Trojan horses
Anti-software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware which can replicate only when the host software it has infected is run is known as what?
Virus
Worm
Spyware
Adware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following does not describe adware?
Sending spam email to users.
Does not harm the user's computer.
Forces users to view unwanted ads through popups and other avenues.
Can be installed via other software, such as with browser plugins.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of malware can be used to track user keystrokes, visited websites and other personal data which is later sent to a bad actor (hacker).
Spyware
Adware
Sneakware
Keylogger

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Worms are best described by which of the following statements.
A type of malware which replicates entirely on its own, attempting to infect other computers.
A type of malware which can only infect another computer when the software it has infected is run.
A type of malware which usually comes as an attachment in an email is attempts to get the user to divulge personal information.
A type of malware which forces a user to view ads.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?