NETESS 2.0 MODULE 15 QUIZ - Security Threats

NETESS 2.0 MODULE 15 QUIZ - Security Threats

12th Grade

33 Qs

quiz-placeholder

Similar activities

COMP 5

COMP 5

5th Grade - University

35 Qs

Unit 10 Cybersecurity CSP

Unit 10 Cybersecurity CSP

9th - 12th Grade

33 Qs

HTML Basics Quiz

HTML Basics Quiz

12th Grade

30 Qs

Impact of Threats

Impact of Threats

12th Grade

35 Qs

Computer Crime and Cybersecurity

Computer Crime and Cybersecurity

12th Grade

30 Qs

MOD9 Topic Test - Cyber Security and Law - CAM Nationals in IT

MOD9 Topic Test - Cyber Security and Law - CAM Nationals in IT

7th Grade - University

32 Qs

CompTIA Security + (Part 1)

CompTIA Security + (Part 1)

12th Grade

34 Qs

Technology Handbook Review

Technology Handbook Review

9th - 12th Grade

35 Qs

NETESS 2.0 MODULE 15 QUIZ - Security Threats

NETESS 2.0 MODULE 15 QUIZ - Security Threats

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ereck Ladd

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Sending a virus that will format the hard drive of a computer is an example of data loss or manipulation threat.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Using stolen credit or identity information to make illegal online purchases is an example of identity theft.


3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor prevents legal users from accessing data services?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Disruption of service attacks occur when legitimate users are prevented from accessing data and services.


4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor steals scientific research data?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Stealing research data or proprietary information is an example of information theft.


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor overloads a network to deny other users network access?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Disruption of service attacks occur when legitimate users are prevented from accessing data and services or the network.


6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor alters data records?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Altering data records is an example of data loss or manipulation.


7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threat is described when a threat actor is stealing the user database of a company?

data loss or manipulation

disruption of service

identity theft

information theft

Answer explanation

  1. Stealing data records or proprietary information is an example of information theft.


Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers