
Revision 2

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
aziana aziz
Used 3+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the CORRECT term related to the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Information Confidentiality
Information Integrity
Information Availability
Information Security
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Refer to figure below, identify type of security attack in information system.
"Your help desk had informed you that they received an urgent call from the Vice President last night requesting his log on ID and Password. When talking to the VP today, he says that he never made that call"
Spoofing
Reply Attack
Malicious Software
Social Engineering
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the purpose of the Denial-of-Service (DOS) Attack in the information system threat.
Exploit the weakness in the TCP/IP stack
To execute a Trojan on a system.
Flooding a system so it cannot operate.
To shutdown services by turning them off
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Select the CORRECT security threat that falls into natural disaster class in information security.
Someone tries to steal critical information from company A
A hacker tries to hack into company X database
Heavy storm tore off the roof of IT Department causing flooding in the server room.
Student modifies the password in the lab PC
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Choose the CORRECT type of security threats based on statement below.
"A worker inside NASA purposely plugs in a USB pen drive into the main server to collect important data every night"
International Threats
Internal Threats
External Threats
Extra Threats
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the CORRECT terminology in cryptographic.
Encryption – The format of the data before being encrypted
Cipher Text – The “scrambled” format of data after being encrypted.
Cryptanalysis – The decryption and analysis of coded, ciphers or encrypted text.
Plain Text – Method by which information is converted into secret code that hide the information true meaning.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Choose the CORRECT folder for file and folder sharing permission based on figure below.
- The folder is shared only with members of the homegroup.
- Homegroup members can only read the contents of the folders.
Nobody
Read
Read & Write
Specific People
Create a free account and access millions of resources
Similar Resources on Wayground
25 questions
Module 1.1: Common Threats

Quiz
•
11th Grade - University
25 questions
SOCIETAL IMPACT(2021-22)

Quiz
•
12th Grade
25 questions
Cyber II | AAA & Authentication Intro by Mr. B

Quiz
•
12th Grade
30 questions
MLSA AZ-900 Study Group Final Quiz

Quiz
•
12th Grade
26 questions
Cloud Computing

Quiz
•
6th - 9th Grade
25 questions
Cybersecurity Quiz 2

Quiz
•
10th Grade - University
25 questions
Computer Systems and Computer Ethics

Quiz
•
8th - 12th Grade
31 questions
Cybersecurity Pre Work

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Analog vs Digital

Quiz
•
9th - 12th Grade
10 questions
CTEA Computer Vocab Terms #1

Quiz
•
12th Grade
10 questions
Exploring Cybersecurity Techniques and Threats

Interactive video
•
6th - 10th Grade
10 questions
Understanding the Internet and Data Transmission

Interactive video
•
7th - 12th Grade