Information Security Quiz for Students

Information Security Quiz for Students

12th Grade

10 Qs

quiz-placeholder

Similar activities

G11 IT Security L2

G11 IT Security L2

12th Grade

10 Qs

Technical Terms - Internet (A-Z) - CIFS

Technical Terms - Internet (A-Z) - CIFS

12th Grade

10 Qs

WiFi

WiFi

12th Grade

8 Qs

Technical Terms - Internet (A-Z) - DNSSEC

Technical Terms - Internet (A-Z) - DNSSEC

12th Grade

10 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

Vocabulary Review Unit 4

Vocabulary Review Unit 4

9th - 12th Grade

12 Qs

Unit 10 - Internet Security

Unit 10 - Internet Security

12th Grade - University

13 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Information Security Quiz for Students

Information Security Quiz for Students

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Tardelli Ronan Coelho Stekel

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a symmetric encryption technique?

RSA

AES

ECC

DSA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to secure communications over a computer network by encrypting the data?

HTTP

FTP

SSL/TLS

SMTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves an attacker intercepting and altering communication between two parties without their knowledge?

Phishing

Man-in-the-Middle

Denial of Service

Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control mechanism grants permissions based on the roles assigned to users within an organization?

Discretionary Access Control (DAC)

Role-Based Access Control (RBAC)

Mandatory Access Control (MAC)

Attribute-Based Access Control (ABAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in an incident response plan?

Containment

Eradication

Identification

Recovery

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common social engineering technique?

SQL Injection

Phishing

Buffer Overflow

Cross-Site Scripting (XSS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption technique uses two different keys, one for encryption and one for decryption?

Symmetric Encryption

Asymmetric Encryption

Hashing

Steganography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?