Quiz on Information Assurance and Security

Quiz on Information Assurance and Security

12th Grade

15 Qs

quiz-placeholder

Similar activities

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade - University

19 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Digital Security

Digital Security

9th - 12th Grade

10 Qs

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

12th Grade

10 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

Network Chuck IT Job Quiz

Network Chuck IT Job Quiz

12th Grade

10 Qs

WJEC ICT Networks KT

WJEC ICT Networks KT

9th - 12th Grade

13 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Quiz on Information Assurance and Security

Quiz on Information Assurance and Security

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Diana Montejo

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of risk in the context of information security?

An item that has value

A weakness that allows a threat to be realized

The likelihood that something bad will happen to an asset

Any action that could damage an asset

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of hacker?

Red-hat Hacker

White-hat Hacker

Gray-hat Hacker

Black-hat Hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware actively attempts to copy itself to other computers?

Spyware

Rootkit

Virus

Trojan Horse

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a security breach?

A network monitoring tool

A method of data encryption

A type of malware

A violation of confidentiality, integrity, or availability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an active attack?

Logging keystrokes

Modifying data in a transmission

Eavesdropping on transmissions

Monitoring network traffic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common purpose of a denial of service attack?

To steal confidential data

To disrupt system services

To install malware

To gain unauthorized access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of hiding program?

Spyware

Virus

Worm

Trojan Horse

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?