Security  Threats 2

Security Threats 2

University

8 Qs

quiz-placeholder

Similar activities

CM QUIZ

CM QUIZ

University

11 Qs

Chapter 7 - Internet and Web Technology

Chapter 7 - Internet and Web Technology

University

10 Qs

OSI MODEAL & PROTOCOLS

OSI MODEAL & PROTOCOLS

University

10 Qs

Database gp1

Database gp1

University

10 Qs

Network Operating Sys

Network Operating Sys

University

8 Qs

Management Information System (Topic 2)

Management Information System (Topic 2)

University

11 Qs

COMPUTER NETWORKING

COMPUTER NETWORKING

10th Grade - University

12 Qs

Topologies

Topologies

University

13 Qs

Security  Threats 2

Security Threats 2

Assessment

Quiz

Computers

University

Medium

Created by

Curtis Forbes

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are reasons why systems are vulnerable t?

accessibility of network

theft of devices

disaster

high prices

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following causes internet vulnerabilities?

Unencrypted VOIP

Faulty hardware

Open network

fix internet addresses

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Eavesdroppers drive by buildings and try to detect S S I D and gain access to network and resources. This refers to

Rogue access points

War driving

Radio Frequency

Sniffing programs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is typically associated with criminal intent?

programmer

cracker

coder

hacker

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security breach may cut into a firm’s market value

true

false

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Name any three types of information systems controls

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

Name two types of plans that are needed to identify a firm's most critical systems?

Evaluate responses using AI:

OFF

8.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these are tools and technologies for sage guarding information systems

two-factor authentication

identity management software

Firewall

Antivirus software

Password systems