Cybersecurity MS

Cybersecurity MS

12th Grade

50 Qs

quiz-placeholder

Similar activities

NetAcad Quiz Questions

NetAcad Quiz Questions

11th Grade - University

48 Qs

The Internet (10.1-10.3)

The Internet (10.1-10.3)

12th Grade

51 Qs

2.8 Wireless Networking

2.8 Wireless Networking

9th - 12th Grade

48 Qs

GCSE Level Key Terminology - 1.3

GCSE Level Key Terminology - 1.3

12th Grade

53 Qs

IT Networking Certification

IT Networking Certification

11th Grade - University

45 Qs

Their Networking Certification

Their Networking Certification

11th Grade - University

45 Qs

Comptia Prep 1

Comptia Prep 1

12th Grade

50 Qs

Cybersecurity Social Engineering Techniques & Facts By Mr. B

Cybersecurity Social Engineering Techniques & Facts By Mr. B

12th Grade

50 Qs

Cybersecurity MS

Cybersecurity MS

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Kristi Mowery

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passwords are used to improve _____ of a network.

Security

Performance

Reliability

Longevity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How would you be able to protect yourself from phishing?

Call your local fish store.

Get an Anti-Virus Program

Change Passwords Every 4-6 months

Both B&C

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a network reliability issue.

The number of users

The type of transmission medium

The frequency of failure

Unauthorized access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does identity theft cause problems for online users?

Steals social security

Locates where you live and all information

Steals bank information

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of rootkit will patch, hook, or replace the version of system call in order to hide information?

Library level rootkits

Kernal level rootkits

System level rootkits

Application level rootkits

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?

Close window

Never use your computer

Anti-Virus Program

Turn Off Computer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.

Database crash attack

DoS (Denial of Service) attack

Data overflow Attack

Buffer Overflow attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?