
IT - Threats to data
Authored by Mohamed Hussein
Instructional Technology
9th - 12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the primary goal of a "man-in-the-middle" attack
Unauthorized access to a system.
Intercepting and altering communication between two parties.
Injecting malicious code into a website.
Exploiting software vulnerabilities.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A threat involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity
SQL injection.
DDoS attacks.
Phishing
Ransomware
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the purpose of encryption?
To obscure data and make it unreadable without the appropriate decryption key.
To detect and prevent malware.
To enhance network speed.
To create secure passwords
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the purpose of a firewall?
To encrypt data.
To filter and monitor network traffic, allowing or blocking specific activities.
To scan for malware in emails.
To recover lost data.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A threat involves the encryption of files or systems, demanding payment for their release
Phishing
Ransomware
Spyware
Trojan horse.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A threat involves the insertion of malicious software into a legitimate program or file to compromise a system
Spyware.
Worm.
Trojan horse.
Adware.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
what is the term for a program that appears harmless but performs malicious activities in the background?
Worm
Ransomware
Spyware
Botnet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?