IASQ3Exam

IASQ3Exam

Professional Development

50 Qs

quiz-placeholder

Similar activities

Kiểm tra giữa kỳ TIN HỌC lớp 6_THCS Nguyễn Trãi_01_21-22

Kiểm tra giữa kỳ TIN HỌC lớp 6_THCS Nguyễn Trãi_01_21-22

Professional Development

50 Qs

Położenie i granice Polski, przeszłość, góry i zlodowacenia

Położenie i granice Polski, przeszłość, góry i zlodowacenia

7th Grade - Professional Development

47 Qs

202508500003

202508500003

Professional Development

45 Qs

Az-900 Prep 2

Az-900 Prep 2

Professional Development

50 Qs

OneBanc

OneBanc

Professional Development

54 Qs

ULANGAN NILAI RAPOT KELAS XII

ULANGAN NILAI RAPOT KELAS XII

Professional Development

50 Qs

Davinci Resolve 17 Fusion 101

Davinci Resolve 17 Fusion 101

11th Grade - Professional Development

45 Qs

CAP2

CAP2

University - Professional Development

50 Qs

IASQ3Exam

IASQ3Exam

Assessment

Quiz

Computers

Professional Development

Hard

Created by

elisa berog

Used 7+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company’s website has been receiving a ______________________, slowing it down significantly. After investigating, you determine it to be a Distributed Denial-of-Service (DDoS) attack, where numerous computers around the world are sending requests to your site continuously without their owners’ knowledge.

Malware infection

Phishing scam

Massive volume of traffic

Targeted advertisement

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While inspecting a system, a technician notices that a software application is bypassing the usual ______________________ and gaining access to certain restricted files. The entry method, identified as Backdoor access, seems to avoid standard security protocols altogether.

Security protocols

Login authentication

System firewalls

User permissions

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your IT team finds that a piece of software on multiple devices within your organization is displaying ______________________ and redirecting users to promotional sites. This behavior is identified as Adware, which generates revenue by showing unwanted advertisements. What type of attack is most likely responsible?

Unwanted pop-ups

Redirecting traffic

Malicious ads

Forced downloads

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security weakness is discovered in a widely used content management system (CMS). Attackers craft a malicious query to exploit the flaw, allowing them to bypass authentication and gain access to sensitive user data stored in the system's database. What type of attack is this?

SQL Injection

Cross-Site Scripting (XSS)

Directory Traversal

File Inclusion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While monitoring network traffic, your IT team notices that an automated script is being used to flood the company’s network with ______________________, creating significant network delays. This program runs at a speed much higher than what a human could achieve. This behavior is identified as a Distributed Denial-of-Service (DDoS) attack, where systems are overwhelmed with excessive requests.

HTTP requests

Network traffic

Automated scripts

Delayed responses

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email asking them to reset their password through a link that leads to a fake login page designed to steal their credentials. What type of attack is this?

Phishing

Spoofing

Keylogging

SQL Injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user installs what they believe to be a legitimate utility software. However, after installation, the program quietly manipulates system settings and steals personal data without the user’s consent. What type of malware is this?

Trojan Horse

Spyware

Rootkit

Adware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?