placeholder image to represent content

Chapter 5 - Digital Safety and Security

Quiz by Arokia Raj

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1

    Which of thefollowing is any event or action that could cause a loss of or damage tocomputer hardware, software, data, information, or processing capability?

    technical terrorism

    information liability

    digital security risk

    network compromise

    30s
  • Q2

    Computer viruses,worms, Trojan horses, and rootkits are classified as which of the following?

    malware

    threats

    untrusted sources

    cybermalls

    30s
  • Q3

    In which particularlydevastating type of DoS attack are multiple unsuspecting computers used toattack multiple computer networks?

    limited

    distributed

    delayed

    staggered

    30s
  • Q4

    Which of thefollowing is a technique intruders use to make their network or Internettransmission appear legitimate to a victim computer or network?

    rebuking

    transmitting

    spoofing

    victimizing

    30s
  • Q5

    Which of thefollowing is a program or set of instructions in a program that allows users tobypass security controls?

    keygens

    rootkit

    back door

    indices

    30s
  • Q6

    To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

    re-securing

    digitization

    decryption

    assessment

    30s
  • Q7

    What occurs when someone steals personal or confidential information?

    information theft

    compaction

    fraud

    corruption

    30s
  • Q8

    Which of the following is an authorized person or company that issues and verifies digital certificates?

    certificate office

    certificate bureau

    certificate agency

    certificate authority

    30s
  • Q9

    Which of the following terms refers to making a copy of a file?

    encrypting

    deciphering

    backing up

    restoring

    30s
  • Q10

    With a three-generation backup policy, the grandparent is which of the following?

    original file

    oldest copy of the file

    most recent copy of  the file

    second oldest copy of the file

    30s

Teachers give this quiz to your class