IT - Threats to data

IT - Threats to data

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Tipos de Virus

Tipos de Virus

2nd Grade - University

20 Qs

Introduction to Information Communication Technology

Introduction to Information Communication Technology

11th Grade

15 Qs

CompTIA Review

CompTIA Review

8th - 9th Grade

15 Qs

Cuestionario sobre Ciberseguridad

Cuestionario sobre Ciberseguridad

11th Grade - University

16 Qs

INTRO TO ICT WEEK 1 FORMATIVE ASSESSMENT

INTRO TO ICT WEEK 1 FORMATIVE ASSESSMENT

11th - 12th Grade

15 Qs

Seguridad en Internet Paula 2ºBach

Seguridad en Internet Paula 2ºBach

12th Grade

21 Qs

Examiner's Reports Quiz

Examiner's Reports Quiz

12th Grade

22 Qs

SSL INTERNET SECURITY

SSL INTERNET SECURITY

11th - 12th Grade

15 Qs

IT - Threats to data

IT - Threats to data

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Hard

Created by

Mohamed Hussein

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary goal of a "man-in-the-middle" attack

Unauthorized access to a system.

Intercepting and altering communication between two parties.

Injecting malicious code into a website.

Exploiting software vulnerabilities.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity

SQL injection.

DDoS attacks.

Phishing

Ransomware

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of encryption?

To obscure data and make it unreadable without the appropriate decryption key.

To detect and prevent malware.

To enhance network speed.

To create secure passwords

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of a firewall?

To encrypt data.

To filter and monitor network traffic, allowing or blocking specific activities.

To scan for malware in emails.

To recover lost data.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves the encryption of files or systems, demanding payment for their release

Phishing

Ransomware

Spyware

Trojan horse.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat involves the insertion of malicious software into a legitimate program or file to compromise a system

Spyware.

Worm.

Trojan horse.

Adware.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

what is the term for a program that appears harmless but performs malicious activities in the background?

Worm

Ransomware

Spyware

Botnet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?