IAS 2 ITEC100 QUIZ

IAS 2 ITEC100 QUIZ

12th Grade

15 Qs

quiz-placeholder

Similar activities

Payroll Checks

Payroll Checks

9th - 12th Grade

10 Qs

Quiz on Data Security and Threats

Quiz on Data Security and Threats

12th Grade

10 Qs

Cybersecurity Trivia Quiz

Cybersecurity Trivia Quiz

12th Grade

16 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

10 Qs

Eduvisit SMP-SMA Genap  "Perkembangan dan Pemanfaatan Teknologi"

Eduvisit SMP-SMA Genap "Perkembangan dan Pemanfaatan Teknologi"

12th Grade

15 Qs

Unit 5: US History Cold War

Unit 5: US History Cold War

9th - 12th Grade

15 Qs

Roblox Quiz *Hard*

Roblox Quiz *Hard*

KG - Professional Development

10 Qs

Musical Terms

Musical Terms

6th Grade - University

19 Qs

IAS 2 ITEC100 QUIZ

IAS 2 ITEC100 QUIZ

Assessment

Quiz

Other

12th Grade

Hard

Created by

Jose Velasquez

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company employee receives email requesting login credentials to verify their account. The email appears to be from the IT department but is actually a scam. What type of attack is this?

Brute Force Attack

Phishing Attack

Man-in-the-Middle Attack

Ransomware Attack

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hospital's patient records system is encrypted by an unknown hacker who demands payment to unlock the data. What type of attack is this?

Spyware

Adware

Ransomware

Rootkit

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user installs a program that appears to be a free antivirus but secretly records their keystrokes. What type of malware is this?

Phishing

Keylogger

Social Engineering

Spyware

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hacker sends thousands of connection requests to a server, overwhelming it and causing it to crash. What type of attack is this?

Phishing Attack

Denial-of-Service (DoS) Attack

Spyware Attack

Man-in-the-Middle Attack

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What cybersecurity measure ensures that data is accessible when needed?

Confidentiality

Integrity

Availability

Encryption

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hacker injects malicious SQL commands into a login form to gain unauthorized access to a database. What type of attack is this?

Phishing

Cross-Site Scripting

SQL Injection

Code Injection

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What method enhances password security?

Using simple passwords for easier recall

Writing down passwords

Using two-factor authentication

Sharing passwords with coworkers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?