Copyright

Types of Internet Security Threats

Instructions:

Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

In the digital world, precautionary steps taken to protect computing resources against cybercrime is called _____.

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 75,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. 'Computer security' focuses on hardware and software, while 'Internet security' focuses on _____.

2. The internet security threat where zombie computers are used to saturate a server with unsolicited requests is referred to as _____.

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

These questions allow you to quickly and efficiently test your understanding of internet security threats. You must identify specific threats and how they can damage a company.

Quiz & Worksheet Goals

Use this quiz and worksheet to measure your knowledge of:

  • The focus of internet security
  • Pharming
  • Security threats with the purpose of intercepting sensitive information

Skills Practiced

  • Defining key concepts - ensure that you can accurately identify main phrases, such as any action taken to protect computer resources against cybercrime
  • Information recall - access the knowledge you've gained regarding the term describing the use of a zombie network of computers to saturate a server's resources
  • Knowledge application - use your knowledge to answer questions about the threat posed by different types of cybercrime to an organization, including pharming and illicit monitoring of private information

Additional Learning

If you are still curious about this type of IT, read the lesson titled Types of Internet Security Threats. You will learn about:

  • The scope of modern cyber attacks
  • Unauthorized use of intellectual property
  • Phishing
  • Ransomware
  • Spyware
Support