CHAPTER 3 - SECURITY BREACHES

CHAPTER 3 - SECURITY BREACHES

University

10 Qs

quiz-placeholder

Similar activities

CIS2103 Week 1-2 CLO1-5 Ch_1_b

CIS2103 Week 1-2 CLO1-5 Ch_1_b

University

6 Qs

Cybersecurity Terminology Quiz Part 1

Cybersecurity Terminology Quiz Part 1

University

15 Qs

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

Quantum Computing

Quantum Computing

8th Grade - University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

15 Qs

Cybersecurity Attacks

Cybersecurity Attacks

University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

DFIR - Phase 2 - Detection

DFIR - Phase 2 - Detection

University

10 Qs

CHAPTER 3 - SECURITY BREACHES

CHAPTER 3 - SECURITY BREACHES

Assessment

Quiz

Computers

University

Hard

Created by

N M

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Types of security breaches EXCEPT ______.

DDOS

Man in the middle attack

Phishing

Encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common method of securing data?

Encryption

Firewall

DDOS

Spam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a security breach where an attacker intercepts communication between two parties?

Phishing

Man in the middle attack

DDOS

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data breach refers to break in without authorization and getting away with information.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ refers to executes unauthorized actions on the victim's system.

Sniffing

DOS

cross-site scripting

Malware attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a security breach where an attacker sends emails pretending to be from a reputable company in order to induce individuals to reveal personal information, such as passwords and credit card numbers?

DDOS

Man in the middle attack

Phishing

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of security breach that floods a network or server with traffic, causing it to become overwhelmed and unavailable to users?

Encryption

Firewall

DDOS

Spam

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?