FINAL EXAM

FINAL EXAM

University

50 Qs

quiz-placeholder

Similar activities

TIK KELAS 8

TIK KELAS 8

11th Grade - University

50 Qs

Cloud Computing(AITU-3 COURSE AWS - MODULE CHECK{1-5})

Cloud Computing(AITU-3 COURSE AWS - MODULE CHECK{1-5})

University

49 Qs

CCNA1 - Introduction to Networks Quiz

CCNA1 - Introduction to Networks Quiz

University

47 Qs

Week 2 - Windows Server 2022 Quiz

Week 2 - Windows Server 2022 Quiz

University

47 Qs

PSAT INFORMATIKA 2025

PSAT INFORMATIKA 2025

10th Grade - University

50 Qs

Information Security and Cybersecurity Quiz

Information Security and Cybersecurity Quiz

University

47 Qs

Module 2: Attacks, Concepts, and Techniques

Module 2: Attacks, Concepts, and Techniques

University

52 Qs

OOP- Quiz #1

OOP- Quiz #1

University

55 Qs

FINAL EXAM

FINAL EXAM

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Mark Feguro

Used 4+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A guest user accessing an administrator modules without permission is an example of what?

A malware attack

Unauthorized access

A data breach

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary preventative measure against data breaches?

Shredding physical documents


Conducting background checks on employees

Using strong passwords

Encrypting sensitive data and using firewalls

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ransomware attack that locks files and demands a payment is categorized as a:

Denial of Service (DoS) attack

Malware attack

Data tampering

VIrus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key strategy to prevent phishing and social engineering attacks?


Installing and updating antivirus software


Using firewalls and anti-DDoS services

Educating individuals to recognize suspicious emails and behavior.


Encrypting sensitive data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Flooding a website with traffic to make it inaccessible to legitimate users is known as what type of attack?

Phishing


Denial of Service (DoS/DDoS) attack

Insider Threat

Malware Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee copying sensitive files to a personal USB drive is an example of an:

Network security


Insider threat

Data protection
File transfer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using checksums, hashing, and digital signatures is a method to prevent:

Data encryption and secure storage.

Data tampering

User authentication and access control.
Data backup and recovery processes.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?