ITEC100 QUIZ 2 AKJHG11AA

ITEC100 QUIZ 2 AKJHG11AA

University

15 Qs

quiz-placeholder

Similar activities

Term 3 Quiz Quizs Review

Term 3 Quiz Quizs Review

9th Grade - University

20 Qs

Cyber Security Awareness Quiz

Cyber Security Awareness Quiz

University

10 Qs

NUEVAS TICs

NUEVAS TICs

University

19 Qs

Amenazas Comunes en Línea

Amenazas Comunes en Línea

University

10 Qs

Ciberseguridad

Ciberseguridad

University

10 Qs

Awesome April

Awesome April

University

15 Qs

MÓDULO 1

MÓDULO 1

1st Grade - University

10 Qs

Assessment # 1-  Information Assurance and Security 1

Assessment # 1- Information Assurance and Security 1

University

15 Qs

ITEC100 QUIZ 2 AKJHG11AA

ITEC100 QUIZ 2 AKJHG11AA

Assessment

Quiz

Instructional Technology

University

Easy

Created by

Jose Velasquez

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company employee receives email requesting login credentials to verify their account. The email appears to be from the IT department but is actually a scam. What type of attack is this?

Brute Force Attack

Phishing Attack

Man-in-the-Middle Attack

Ransomware Attack

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hospital's patient records system is encrypted by an unknown hacker who demands payment to unlock the data. What type of attack is this?

Spyware

Adware

Ransomware

Rootkit

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user installs a program that appears to be a free antivirus but secretly records their keystrokes. What type of malware is this?

Phishing

Keylogger

Social Engineering

Spyware

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hacker sends thousands of connection requests to a server, overwhelming it and causing it to crash. What type of attack is this?

Phishing Attack

Denial-of-Service (DoS) Attack

Spyware Attack

Man-in-the-Middle Attack

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What cybersecurity measure ensures that data is accessible when needed?

Confidentiality

Integrity

Availability

Encryption

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hacker injects malicious SQL commands into a login form to gain unauthorized access to a database. What type of attack is this?

Phishing

Cross-Site Scripting

SQL Injection

Code Injection

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What method enhances password security?

Using simple passwords for easier recall

Writing down passwords

Using two-factor authentication

Sharing passwords with coworkers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?