L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

University

17 Qs

quiz-placeholder

Similar activities

RandonQuestionRoutingChapter10

RandonQuestionRoutingChapter10

University

12 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

Network and Internet Security

Network and Internet Security

University

20 Qs

Cybersecurity Threats and Prevention Quiz

Cybersecurity Threats and Prevention Quiz

9th Grade - University

20 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

1.3 - Surveying the Cyberspace

1.3 - Surveying the Cyberspace

University

15 Qs

Mitigating Threats

Mitigating Threats

University

12 Qs

L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Jerry Jackson Bent

Used 1+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are intruders who exploit cyber security vulnerabilities called?

Hackers

Threat actors

Cyber police

Network administrators

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of threat that may arise after a threat actor gains access to the network?

Information theft

Data loss and manipulation

Identity theft

Software installation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of threat that may arise after a threat actor gains access to the network?

Data Loss and Manipulation

System upgrade

Network optimization

Software development

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for breaking into a computer to obtain confidential information?

Data Mining

Information Theft

Phishing

Social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data loss?

A threat actor sending a virus that reformats a computer hard drive

Breaking into a records system to change information

Changing the price of an item in a database

Altering data records without authorization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data manipulation?

A threat actor sending a virus that reformats a computer hard drive

Breaking into a records system to change information

Destroying data records

Reformatting a computer hard drive

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is identity theft?

A form of information theft where personal information is stolen to take over someone's identity.

A type of physical theft involving stealing someone's belongings.

A method of hacking into someone's computer to steal files.

A way to legally obtain someone's personal information.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?