
untitled
Authored by Geraldine Magloire
Computers
10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It helps keep data and equipment safe by giving only the appropriate people access.
network security
firewall
antivirus
security threats
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When an employee intends to cause damage
Malicious Threats
Accidental Threats
Data Security Attacks
Physical Security Attacks
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When the user damages data or equipment unintentionally
Malicious Threats
Accidental Threats
Physical Security Threats
Data Security Threats
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Events or attacks that steal, damage, or destroy equipments.
Malicious Threats
Accidental Threats
Data Security Threats
Physical Security Threats
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
Malicious Threats
Accidental Threats
Data Security Attacks
Physical Security Attacks
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It uses available resources, such as passwords or scripts.
Accidental Threats
Malicious Threats
Structured Attacks
Unstructured Attacks
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It uses code to access operating systems and software.
Structured Attacks
Unstructured Attacks
Malicious Threats
Accidental Threats
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?