Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

12th Grade

25 Qs

quiz-placeholder

Similar activities

Quiz Informatika

Quiz Informatika

11th Grade - University

20 Qs

ĐỀ CƯƠNG ÔN TẬP CUỐI HỌC KÌ 2 LỚP 5

ĐỀ CƯƠNG ÔN TẬP CUỐI HỌC KÌ 2 LỚP 5

5th Grade - University

20 Qs

ATS INFORMATIKA GENAP 2025

ATS INFORMATIKA GENAP 2025

12th Grade

20 Qs

Producción de Contenido

Producción de Contenido

9th - 12th Grade

20 Qs

Eva_Est_P1_11_PMV

Eva_Est_P1_11_PMV

4th Grade - University

20 Qs

PTS Genap Informatika Kelas XII

PTS Genap Informatika Kelas XII

12th Grade - University

20 Qs

Agriculture Quiz

Agriculture Quiz

7th Grade - University

20 Qs

soal microsoft word

soal microsoft word

9th - 12th Grade

20 Qs

Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

Assessment

Quiz

Information Technology (IT)

12th Grade

Medium

Created by

Alpie Catama

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

5 sec • 1 pt

What does CIA stand for in the context of IT security?

2.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is the primary purpose of a firewall?

To prevent malware from infecting the system

To block unauthorized access while permitting authorized communications

To encrypt data during transmission

To monitor user activity on the internet

3.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What type of attack involves flooding a network with traffic to overload a system?

Phishing

Man-in-the-Middle attack

Denial of Service (DoS) attack

SQL Injection

4.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Which of the following is a social engineering attack?

Malware

Phishing

Ransomware

Virus

5.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is the role of encryption in cybersecurity?

To speed up internet connections

To scramble data so that only authorized parties can read it

To delete unnecessary files on a computer

To create backups of data

6.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Which one of the following is a common form of malware?

SSL

Virus

SQL

HTTPS

7.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is a zero-day exploit?

A vulnerability that has not yet been discovered

An attack that occurs immediately after the vulnerability is disclosed

A new type of virus

A backup strategy for cybersecurity

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?