
IT Security Threats
Quiz by John Burnett
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1Continually bombarding a targeted network with fake requests is what type of threat?D o S Denial of Service45s
- Q2Someone posing as an IT tech and requesting information about your computer configuration is?Phising45s
- Q3What security protocol does WPA2 use?802.11i45s
- Q4Monitoring software that is installed on your computer without your permission.Spyware45s
- Q5A wireless access point uses this information for authentication.SSID45s
- Q6Is a Denial of Service Attack considered unintentional or intentional?intentional45s
- Q7Theft of data is considered what type of threat?intentional45s
- Q8Computer failures, power failures and Acts of God are considered.unintentional45s
- Q9A method for securing data by using special mathematical algorithms to convert data into scrambled code before transmission.encryption45s
- Q10Computer viruses are considered to be what type of threats?intentional45s