Security Threats Quiz

Security Threats Quiz

12th Grade

20 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

15 Qs

Brain Teaser Round I [HS] 5th july

Brain Teaser Round I [HS] 5th july

9th - 12th Grade

20 Qs

AP-CSP Unit 4 Test Review

AP-CSP Unit 4 Test Review

11th - 12th Grade

21 Qs

Unit 11: Software and hardware security measures

Unit 11: Software and hardware security measures

12th Grade

20 Qs

OSI Model

OSI Model

12th Grade

25 Qs

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

9th Grade - University

18 Qs

APCSP Vocabulary

APCSP Vocabulary

10th - 12th Grade

18 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Security Threats Quiz

Security Threats Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Naquai Roundtree

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common technique used in social engineering attacks?

A) Brute force attack

B) Phishing

C) SQL injection

D) Buffer overflow

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a software vulnerability?

A) Use of hard-coded passwords

B) Outdated antivirus software

C) SQL injection

D) Buffer overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of network security threat involves intercepting data packets as they travel across a network?

A) Phishing

B) DDoS attack

C) Packet sniffing

D) Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a physical security risk?

A) SQL injection

B) Tailgating

C) Phishing

D) DDoS attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What data encryption technique involves using the same key for both encryption and decryption?

A) Asymmetric encryption

B) Symmetric encryption

C) Hashing

D) Salting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which social engineering attack involves an attacker pretending to be a high-level executive to trick employees into giving them access to sensitive information?

A) Baiting

B) Pretexting

C) Phishing

D) Whaling

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A) A vulnerability that has been patched but not yet released to the public

B) A vulnerability that is known to the software vendor but not yet fixed

C) A vulnerability that is unknown to the software vendor and thus has no patch

D) A vulnerability that only affects zero-day old software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?