2.0 Threats, Vulnerabilities, and Mitigations

2.0 Threats, Vulnerabilities, and Mitigations

10th Grade

20 Qs

quiz-placeholder

Similar activities

Rischi della rete: test di consapevolezza

Rischi della rete: test di consapevolezza

8th Grade - University

15 Qs

PFL UNIT 4 SUMMATIVE

PFL UNIT 4 SUMMATIVE

9th - 12th Grade

20 Qs

Ch. 18: Work & the Economy

Ch. 18: Work & the Economy

9th - 12th Grade

17 Qs

Unit 2: Asia

Unit 2: Asia

10th Grade

15 Qs

Soal Latihan Pengembangan aplikasi destop

Soal Latihan Pengembangan aplikasi destop

10th Grade

25 Qs

Internet Safety

Internet Safety

6th Grade - University

15 Qs

2.0 Threats, Vulnerabilities, and Mitigations

2.0 Threats, Vulnerabilities, and Mitigations

Assessment

Quiz

Social Studies

10th Grade

Hard

Created by

Wayground Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware

Software that serves a malicious purpose, typically installed without the user's consent (or knowledge).

A type of software that enhances system performance and security.

An application designed to improve user productivity and efficiency.

A program that helps in managing computer hardware resources.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Worm

A type of malware that replicates between processes in system memory and can spread over client/server network connections.

A type of software that helps in managing system resources.

A program that is designed to harm or exploit any programmable device or network.

A tool used for data recovery and backup.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Blackmail

Demanding payment to prevent the release of information.

Offering a reward for information.

Requesting payment for a service rendered.

Threatening to disclose personal secrets for money.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Typosquatting

An attack where an attacker registers a domain name with a common misspelling of an existing domain.

A method of phishing that involves sending emails with fake links.

A technique used to improve website SEO by using popular keywords.

A form of malware that infects a user's computer through a web browser.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unskilled attacker

A highly skilled hacker who creates their own tools.

An inexperienced attacker that typically uses tools or scripts created by others.

A professional security consultant who tests systems for vulnerabilities.

A government agent conducting surveillance on cybercriminals.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unintentional or inadvertent insider threat

A threat actor that causes a vulnerability or exposes an attack vector without malicious intent.

A malicious insider who intentionally leaks sensitive information.

An external hacker attempting to breach a system.

A software bug that creates security vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware

Software that records information about a PC and its users, often installed without the user's consent.

A type of antivirus software that protects against malware.

A program that speeds up computer performance by cleaning up files.

A tool used for monitoring network traffic and performance.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?