Tick all that apply: APP 11 requires that APP entities...
12 CSC ATAR - Cyber security

Quiz
•
Computers
•
12th Grade
•
Easy

Alex K
Used 10+ times
FREE Resource
17 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Take active measures to ensure the security of personal information it holds, and to actively consider whether it is permitted to retain personal information.
Take reasonable steps to protect personal information from misuse, interference and loss, as well as unauthorised access, modification or disclosure.
Take reasonable steps to destroy or de-identify the personal information it holds once the personal information is no longer needed.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Masquerading as a trusted device or user by forging the source IP address in network packets.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Multiple sources coordinating an attack on a network, server, or website, by sending excessive network traffic to exhaust resources and make the resource unavailable to legitimate users.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Exploiting vulnerabilities in web applications to insert malicious SQL code into a database query, potentially leading to data theft or manipulation.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Injecting malicious scripts into otherwise trusted websites. These scripts can then run in the user's browser, potentially stealing information or hijacking sessions.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software flaws unknown to the software vendor and, therefore, for which no patch exists.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hidden method of bypassing normal authentication or encryption in a computer system, network, or software application, often installed by attackers.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
Create a free account and access millions of resources
Similar Resources on Wayground
14 questions
L8 - Defense in Dept & VPN | ICSS Lesson Quiz

Quiz
•
12th Grade
15 questions
Topic 4 - Understanding System Vulnerabilities

Quiz
•
12th Grade - University
20 questions
Cybersecurity2

Quiz
•
12th Grade
14 questions
Cyber Security Quiz

Quiz
•
12th Grade
19 questions
Computer Security Measures

Quiz
•
12th Grade - University
20 questions
network structures

Quiz
•
12th Grade
20 questions
SECURITY TROUBLESHOOTING AND SOLUTIONS

Quiz
•
9th - 12th Grade
20 questions
Unit 11: Software and hardware security measures

Quiz
•
12th Grade
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade