untitled

untitled

10th Grade

11 Qs

quiz-placeholder

Similar activities

Satellite and Network

Satellite and Network

12th Grade

15 Qs

Unauthorized Access and Modification

Unauthorized Access and Modification

University

15 Qs

Data Security

Data Security

9th - 10th Grade

15 Qs

CHAPTER 4: IDS AND IPS

CHAPTER 4: IDS AND IPS

University

10 Qs

Network Security

Network Security

10th Grade

12 Qs

Week #7 - Risk Management

Week #7 - Risk Management

University

12 Qs

IGCSE ICT - Safety and Security

IGCSE ICT - Safety and Security

10th - 12th Grade

7 Qs

Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

University

10 Qs

untitled

untitled

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Geraldine Magloire

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It helps keep data and equipment safe by giving only the appropriate people access.
network security
firewall
antivirus
security threats

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an employee intends to cause damage 
Malicious Threats
Accidental Threats
Data Security Attacks
Physical Security Attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the user damages data or equipment unintentionally
Malicious Threats
Accidental Threats
Physical Security Threats
Data Security Threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Events or attacks that steal, damage, or destroy equipments.
Malicious Threats
Accidental Threats
Data Security Threats
Physical Security Threats

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
Malicious Threats
Accidental Threats
Data Security Attacks
Physical Security Attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It uses available resources, such as passwords or scripts.
Accidental Threats
Malicious Threats
Structured Attacks
Unstructured Attacks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It uses code to access operating systems and software.
Structured Attacks
Unstructured Attacks
Malicious Threats
Accidental Threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?