placeholder image to represent content

IT Security Threats

Quiz by John Burnett

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1
    Continually bombarding a targeted network with fake requests is what type of threat?
    D o S Denial of Service
    45s
  • Q2
    Someone posing as an IT tech and requesting information about your computer configuration is?
    Phising
    45s
  • Q3
    What security protocol does WPA2 use?
    802.11i
    45s
  • Q4
    Monitoring software that is installed on your computer without your permission.
    Spyware
    45s
  • Q5
    A wireless access point uses this information for authentication.
    SSID
    45s
  • Q6
    Is a Denial of Service Attack considered unintentional or intentional?
    intentional
    45s
  • Q7
    Theft of data is considered what type of threat?
    intentional
    45s
  • Q8
    Computer failures, power failures and Acts of God are considered.
    unintentional
    45s
  • Q9
    A method for securing data by using special mathematical algorithms to convert data into scrambled code before transmission.
    encryption
    45s
  • Q10
    Computer viruses are considered to be what type of threats?
    intentional
    45s

Teachers give this quiz to your class