FINAL EXAM

FINAL EXAM

University

50 Qs

quiz-placeholder

Similar activities

SISTEM INFORMASI (PERTEMUAN 6)

SISTEM INFORMASI (PERTEMUAN 6)

University

50 Qs

Ulangan Microsoft Word

Ulangan Microsoft Word

10th Grade - University

50 Qs

TIK KELAS 8

TIK KELAS 8

11th Grade - University

50 Qs

PEC Midterm Assessment

PEC Midterm Assessment

University

45 Qs

INTRO TO ICT TEST

INTRO TO ICT TEST

University

50 Qs

Ulangan Informatika kelas 9 Bab Berfikir Komputasional

Ulangan Informatika kelas 9 Bab Berfikir Komputasional

9th Grade - University

50 Qs

KELAS X BAB 1 INFORMATIKA DAN KETRAMPILAN GENERIK

KELAS X BAB 1 INFORMATIKA DAN KETRAMPILAN GENERIK

10th Grade - University

50 Qs

UH 5

UH 5

9th Grade - University

50 Qs

FINAL EXAM

FINAL EXAM

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Mark Feguro

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A guest user accessing an administrator modules without permission is an example of what?

A malware attack

Unauthorized access

A data breach

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary preventative measure against data breaches?

Shredding physical documents


Conducting background checks on employees

Using strong passwords

Encrypting sensitive data and using firewalls

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ransomware attack that locks files and demands a payment is categorized as a:

Denial of Service (DoS) attack

Malware attack

Data tampering

VIrus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key strategy to prevent phishing and social engineering attacks?


Installing and updating antivirus software


Using firewalls and anti-DDoS services

Educating individuals to recognize suspicious emails and behavior.


Encrypting sensitive data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Flooding a website with traffic to make it inaccessible to legitimate users is known as what type of attack?

Phishing


Denial of Service (DoS/DDoS) attack

Insider Threat

Malware Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee copying sensitive files to a personal USB drive is an example of an:

Network security


Insider threat

Data protection
File transfer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using checksums, hashing, and digital signatures is a method to prevent:

Data encryption and secure storage.

Data tampering

User authentication and access control.
Data backup and recovery processes.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?