Module 1: Network Security Certification Exam

Module 1: Network Security Certification Exam

9th - 12th Grade

46 Qs

quiz-placeholder

Similar activities

Theme E Ch1-3

Theme E Ch1-3

9th Grade

45 Qs

Information Technology

Information Technology

12th Grade

50 Qs

GRADE 12 - COMPUTER SYSTEM SERVICING

GRADE 12 - COMPUTER SYSTEM SERVICING

12th Grade

50 Qs

Computer Science Paper 1 Revision Quiz

Computer Science Paper 1 Revision Quiz

9th - 12th Grade

42 Qs

GCSE OCR Computer Science J277 Paper 1

GCSE OCR Computer Science J277 Paper 1

11th Grade

45 Qs

OSI Layer

OSI Layer

12th Grade - University

48 Qs

J277 Paper 1 Recap

J277 Paper 1 Recap

9th Grade

44 Qs

Unit 2 Global Information Cambridge Technicals IT L3

Unit 2 Global Information Cambridge Technicals IT L3

10th - 12th Grade

42 Qs

Module 1: Network Security Certification Exam

Module 1: Network Security Certification Exam

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Iwin Ross

Used 1+ times

FREE Resource

46 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program hiding inside a useful program with malicious purposes.

Trojan

Worm

Ransomeware

Phisphing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Able to attack the network using a smart device with low security like a thermostate, or home sercurity

Rootkits

Denial of Service

Zero Day Exploit

IOT Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Everyone receives the same email in the office stating that they need to download the app to to prevent their computer for viruses. Thus allowing attacker gain access to your computer

Worms

Phisphing

Ransomware

Man in the Middle Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Legitimate software, where they can gain remote control and administration-level access over a system

Ransomware

Rootkits

Zero Day Exploit

DOS Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Taking an advantage of the small window when firmware being updated and before it's implimementd

Zero Day Exploit

Virus

Worm

Password Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program that is designed to overwhelm email servers and cause DOS

Worm

Trojan

Ransomeware

Spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacker intercepts a two-party transaction, to steal and manipulate information for they own good.

Rootkits

Zero Day Exploit

Denial of Service (DOS)

Man In the Middle(MitM)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?