
Module 1.1: Common Threats
Authored by Damian Green
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT considered a common type of cyber threat?
Malware
Phishing
Firewall
Denial of Service (DoS)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term describes a weakness in a system that can be exploited by an attacker?
Threat
Vulnerability
Attack
Exploit
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of an internal threat?
Hackers from another country
Natural disasters
Disgruntled employees
Competitors stealing data
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary difference between threats to private and public clouds?
Private clouds are immune to threats
Public clouds are always more secure
Private clouds have more control over security measures
Public clouds only face external threats
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common user vulnerability?
Using strong, unique passwords
Falling for phishing emails
Regularly updating software
Enabling two-factor authentication
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware hides itself and provides unauthorized access to a system?
Virus
Worm
Trojan horse
Rootkit
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which threat is specifically designed to exploit vulnerabilities in applications?
SQL injection
Physical theft
Power outage
Network sniffer
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?