
L7 MSC Network Security Quiz
Authored by Jerry Jackson Bent
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are intruders who exploit cyber security vulnerabilities called?
Hackers
Threat actors
Cyber police
Network administrators
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a type of threat that may arise after a threat actor gains access to the network?
Information theft
Data loss and manipulation
Identity theft
Software installation
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of threat that may arise after a threat actor gains access to the network?
Data Loss and Manipulation
System upgrade
Network optimization
Software development
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used for breaking into a computer to obtain confidential information?
Data Mining
Information Theft
Phishing
Social engineering
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of data loss?
A threat actor sending a virus that reformats a computer hard drive
Breaking into a records system to change information
Changing the price of an item in a database
Altering data records without authorization
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of data manipulation?
A threat actor sending a virus that reformats a computer hard drive
Breaking into a records system to change information
Destroying data records
Reformatting a computer hard drive
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is identity theft?
A form of information theft where personal information is stolen to take over someone's identity.
A type of physical theft involving stealing someone's belongings.
A method of hacking into someone's computer to steal files.
A way to legally obtain someone's personal information.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?