
Chapter 5 - Digital Safety and Security
Quiz by Arokia Raj
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Which of thefollowing is any event or action that could cause a loss of or damage tocomputer hardware, software, data, information, or processing capability?
technical terrorism
information liability
digital security risk
network compromise
30s - Q2
Computer viruses,worms, Trojan horses, and rootkits are classified as which of the following?
malware
threats
untrusted sources
cybermalls
30s - Q3
In which particularlydevastating type of DoS attack are multiple unsuspecting computers used toattack multiple computer networks?
limited
distributed
delayed
staggered
30s - Q4
Which of thefollowing is a technique intruders use to make their network or Internettransmission appear legitimate to a victim computer or network?
rebuking
transmitting
spoofing
victimizing
30s - Q5
Which of thefollowing is a program or set of instructions in a program that allows users tobypass security controls?
keygens
rootkit
back door
indices
30s - Q6
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
re-securing
digitization
decryption
assessment
30s - Q7
What occurs when someone steals personal or confidential information?
information theft
compaction
fraud
corruption
30s - Q8
Which of the following is an authorized person or company that issues and verifies digital certificates?
certificate office
certificate bureau
certificate agency
certificate authority
30s - Q9
Which of the following terms refers to making a copy of a file?
encrypting
deciphering
backing up
restoring
30s - Q10
With a three-generation backup policy, the grandparent is which of the following?
original file
oldest copy of the file
most recent copy of the file
second oldest copy of the file
30s