Network Security

Network Security

12th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

CSP Unit 10 Pre-Assessment - Cybersecurity

CSP Unit 10 Pre-Assessment - Cybersecurity

9th - 12th Grade

10 Qs

Understanding Cybersecurity and Cybercriminals

Understanding Cybersecurity and Cybercriminals

12th Grade

10 Qs

IT Unit 11 Cyber Security Key Terms

IT Unit 11 Cyber Security Key Terms

11th - 12th Grade

10 Qs

Cyber Security

Cyber Security

9th - 12th Grade

15 Qs

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

Unit 3 - 2.4.3 -Trojans, Backdoors, and RATs

Unit 3 - 2.4.3 -Trojans, Backdoors, and RATs

12th Grade

10 Qs

 Network Security

Network Security

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Waqqad Rasheed

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that encrypts a user’s data and demands payment to restore access?

Virus

Spyware

Ransomware

Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a Distributed Denial of Service (DDoS) attack?

To steal sensitive user data

To prevent legitimate users from accessing a web server

To install backdoors for future access

To distribute malware to multiple systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a botnet?

A network of legitimate servers used for data transfer

A group of compromised computers controlled by a third party

A software program designed to detect malware

A type of firewall used for network security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a physical security measure?

Anti-malware software

Encryption

Alarm systems

Firewalls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a backdoor in software allow a hacker to do?

Encrypt all the data on a system

Access a system without the user’s authorization

Prevent users from accessing legitimate websites

Send malicious requests to a web server

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which physical security method allows monitoring of unauthorized access attempts?

Lock requiring a key

Barrier

CCTV

Biometric systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the method used by crackers to gain unauthorized access to a system?

Using a brute force approach to guess passwords

Installing spyware to monitor user activities

Infecting a computer with a virus

Encrypting files to demand ransom

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?