
Quiz on Information Assurance and Security
Authored by Diana Montejo
Computers
12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of risk in the context of information security?
An item that has value
A weakness that allows a threat to be realized
The likelihood that something bad will happen to an asset
Any action that could damage an asset
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a type of hacker?
Red-hat Hacker
White-hat Hacker
Gray-hat Hacker
Black-hat Hacker
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware actively attempts to copy itself to other computers?
Spyware
Rootkit
Virus
Trojan Horse
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a security breach?
A network monitoring tool
A method of data encryption
A type of malware
A violation of confidentiality, integrity, or availability
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of an active attack?
Logging keystrokes
Modifying data in a transmission
Eavesdropping on transmissions
Monitoring network traffic
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common purpose of a denial of service attack?
To steal confidential data
To disrupt system services
To install malware
To gain unauthorized access
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of hiding program?
Spyware
Virus
Worm
Trojan Horse
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?