MODULE 2: Attacks, cincepts and techniques QUIZ

MODULE 2: Attacks, cincepts and techniques QUIZ

9th Grade

5 Qs

quiz-placeholder

Similar activities

Premiere Pro Video Project Organization

Premiere Pro Video Project Organization

9th - 12th Grade

10 Qs

RECOMENDACIONES PARA USAR INTERNET Y LAS REDES SOCIALES CON

RECOMENDACIONES PARA USAR INTERNET Y LAS REDES SOCIALES CON

1st - 12th Grade

5 Qs

Lez. 03 - Ripasso delle puntate precedenti 02 (Full)

Lez. 03 - Ripasso delle puntate precedenti 02 (Full)

9th - 12th Grade

10 Qs

Test TIK Kelas 10 Part-1

Test TIK Kelas 10 Part-1

9th - 12th Grade

10 Qs

TECNOLOGÍA E INFORMÁTICA

TECNOLOGÍA E INFORMÁTICA

6th - 11th Grade

10 Qs

0001

0001

9th - 12th Grade

8 Qs

Device Drivers (CSS)

Device Drivers (CSS)

9th - 10th Grade

10 Qs

Programming in Robotics

Programming in Robotics

6th - 11th Grade

10 Qs

MODULE 2: Attacks, cincepts and techniques QUIZ

MODULE 2: Attacks, cincepts and techniques QUIZ

Assessment

Quiz

Instructional Technology

9th Grade

Medium

Created by

Robert Robinson

Used 6+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

Malware designed to track your online activity and capture your data

Adware
Spyware
Ransomware
Trojan horse

2.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

Select the correct answer from the dropdowns, then Submit:

You have started getting an error message when accessing your computer: ‘Your connection was interrupted. A network change was detected.'

Social engineering

SEO poisoning

DoS

3.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Which of the following examples illustrates how malware might be concealed?

Using strong passwords to protect files.
Installing antivirus programs to detect threats.
Regularly updating software to prevent malware.
Embedding malware in legitimate software or disguising it as harmless files.

4.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

'Securing physical access to target equipment is an organization’s best defense against a cyber attack.' Is this true or false?

True
False

5.

MULTIPLE SELECT QUESTION

2 mins • 20 pts

Can you identify the software vulnerability from the following descriptions?

1.Occurs when data is written beyond the limits of memory areas that are allocated to an application.

2.Occurs when an ordered or timed set of processes is disrupted or altered by an exploit.

3.Occurs through the improper use of practices that manage equipment, data or applications

Buffer overflow

Race condition

Access control

Social engineering

Packet sniffing

Discover more resources for Instructional Technology