IT - Threats to data

IT - Threats to data

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

IC3 GS6 Level 1 Test Part 1 of 5

IC3 GS6 Level 1 Test Part 1 of 5

6th - 12th Grade

25 Qs

AIJ

AIJ

12th Grade

24 Qs

Linux Pertemuan 1 Ikhwan

Linux Pertemuan 1 Ikhwan

9th - 12th Grade

25 Qs

Variables in RobotC

Variables in RobotC

9th - 12th Grade

15 Qs

ICT

ICT

5th - 10th Grade

23 Qs

CompTIA A+ Acronyms Quiz

CompTIA A+ Acronyms Quiz

12th Grade

20 Qs

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

Internet Protocol

Internet Protocol

10th Grade

15 Qs

IT - Threats to data

IT - Threats to data

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Hard

Created by

Mohamed Hussein

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary goal of a "man-in-the-middle" attack

Unauthorized access to a system.

Intercepting and altering communication between two parties.

Injecting malicious code into a website.

Exploiting software vulnerabilities.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity

SQL injection.

DDoS attacks.

Phishing

Ransomware

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of encryption?

To obscure data and make it unreadable without the appropriate decryption key.

To detect and prevent malware.

To enhance network speed.

To create secure passwords

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of a firewall?

To encrypt data.

To filter and monitor network traffic, allowing or blocking specific activities.

To scan for malware in emails.

To recover lost data.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves the encryption of files or systems, demanding payment for their release

Phishing

Ransomware

Spyware

Trojan horse.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves the insertion of malicious software into a legitimate program or file to compromise a system

Spyware.

Worm.

Trojan horse.

Adware.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

what is the term for a program that appears harmless but performs malicious activities in the background?

Worm

Ransomware

Spyware

Botnet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Instructional Technology