NETESS 2.0 MODULE 15 QUIZ - Security Threats
Quiz
•
Computers
•
12th Grade
•
Hard

Ereck Ladd
FREE Resource
33 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Sending a virus that will format the hard drive of a computer is an example of data loss or manipulation threat.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Using stolen credit or identity information to make illegal online purchases is an example of identity theft.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor prevents legal users from accessing data services?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Disruption of service attacks occur when legitimate users are prevented from accessing data and services.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor steals scientific research data?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Stealing research data or proprietary information is an example of information theft.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor overloads a network to deny other users network access?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Disruption of service attacks occur when legitimate users are prevented from accessing data and services or the network.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor alters data records?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Altering data records is an example of data loss or manipulation.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor is stealing the user database of a company?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Stealing data records or proprietary information is an example of information theft.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
30 questions
PGE Revision 5
Quiz
•
12th Grade
30 questions
Revision 2
Quiz
•
9th - 12th Grade
30 questions
Computer Boot Process and Input/Output Devices Quiz
Quiz
•
12th Grade
35 questions
CompTIA ITF+ Test 2-2
Quiz
•
10th - 12th Grade
30 questions
ONE 6th FORM Unit 11 EoT Quiz Cyber Security
Quiz
•
12th Grade
30 questions
ONE 6th FORM Forensic Computing
Quiz
•
12th Grade
30 questions
Online vs Traditional Shopping
Quiz
•
7th - 12th Grade
28 questions
IT Systems in Organisations Part 2
Quiz
•
12th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade