What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
NETESS 2.0 MODULE 15 QUIZ - Security Threats

Quiz
•
Computers
•
12th Grade
•
Hard

Ereck Ladd
FREE Resource
33 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Sending a virus that will format the hard drive of a computer is an example of data loss or manipulation threat.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Using stolen credit or identity information to make illegal online purchases is an example of identity theft.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor prevents legal users from accessing data services?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Disruption of service attacks occur when legitimate users are prevented from accessing data and services.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor steals scientific research data?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Stealing research data or proprietary information is an example of information theft.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor overloads a network to deny other users network access?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Disruption of service attacks occur when legitimate users are prevented from accessing data and services or the network.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor alters data records?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Altering data records is an example of data loss or manipulation.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of threat is described when a threat actor is stealing the user database of a company?
data loss or manipulation
disruption of service
identity theft
information theft
Answer explanation
Stealing data records or proprietary information is an example of information theft.
Create a free account and access millions of resources
Similar Resources on Quizizz
32 questions
CyberOps Chapter 24-25 Review

Quiz
•
9th - 12th Grade
35 questions
CyberOps Modules 24-25

Quiz
•
12th Grade
30 questions
Data Security Quiz

Quiz
•
8th Grade - University
34 questions
Chapter 5 - Online Protection

Quiz
•
9th - 12th Grade
30 questions
INFORMATION TECHNOLOGY-FORM FOUR-EOT

Quiz
•
10th - 12th Grade
30 questions
BTEC Level 3 Laws

Quiz
•
11th - 12th Grade
32 questions
Computer Legislation

Quiz
•
9th - 12th Grade
36 questions
2.2 - Threat Actor Types

Quiz
•
12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade