Network Security

Network Security

12th Grade

10 Qs

quiz-placeholder

Similar activities

Directorios y Carpetas

Directorios y Carpetas

12th Grade

10 Qs

Know thy Peer-to-Peer

Know thy Peer-to-Peer

12th Grade

10 Qs

Access - Lesson 14

Access - Lesson 14

9th - 12th Grade

10 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Wee Word Intro

Wee Word Intro

7th - 12th Grade

12 Qs

Internet

Internet

6th - 12th Grade

13 Qs

Hour of Code

Hour of Code

2nd - 12th Grade

10 Qs

XI_осн_веб_кон

XI_осн_веб_кон

9th - 12th Grade

10 Qs

 Network Security

Network Security

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Waqqad Rasheed

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that encrypts a user’s data and demands payment to restore access?

Virus

Spyware

Ransomware

Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a Distributed Denial of Service (DDoS) attack?

To steal sensitive user data

To prevent legitimate users from accessing a web server

To install backdoors for future access

To distribute malware to multiple systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a botnet?

A network of legitimate servers used for data transfer

A group of compromised computers controlled by a third party

A software program designed to detect malware

A type of firewall used for network security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a physical security measure?

Anti-malware software

Encryption

Alarm systems

Firewalls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a backdoor in software allow a hacker to do?

Encrypt all the data on a system

Access a system without the user’s authorization

Prevent users from accessing legitimate websites

Send malicious requests to a web server

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which physical security method allows monitoring of unauthorized access attempts?

Lock requiring a key

Barrier

CCTV

Biometric systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the method used by crackers to gain unauthorized access to a system?

Using a brute force approach to guess passwords

Installing spyware to monitor user activities

Infecting a computer with a virus

Encrypting files to demand ransom

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?