Which of the following is the most common method for spreading viruses?
IBA Chapter 8B

Quiz
•
Computers
•
8th - 12th Grade
•
Hard
George Jenness
Used 122+ times
FREE Resource
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Swapping disks or drives
Opening attachments
Installing programs
Downloading files
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You receive an unexpected e-mail with an attachment from a co-worker. You call the co-worker to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. Which of the following is your co-worker's best response to your question?
She should ask you to open the attachment and describe its contents.
She should ask you to forward the e-mail to her so she can open the attachment and check it.
She should ask you to forward the e-mail to your company's management.
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement best describes symmetric-key encryption?
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages
An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message
An encryption method in which the same key is used to encrypt and decrypt a message
essage
D
An encryption method in which a key is required to encrypt data for storage and to verify its integrity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term is used to describe the process that converts data into an unreadable form of text?
Certification
Encryption
Authentication
Decryption
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The level of secrecy offered by encryption is dependent on:
whether or not the data you are encrypting is licensed.
the type of encryption used and the size of the key.
the transmission speed used to encrypt or decrypt data.
whether or not the data you are encrypting is copyrighted.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement best describes hash encryption?
An encryption method in which a key is required to encrypt data for storage and verify its integrity
An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages
An encryption method in which the same key is used to encrypt and decrypt a message
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term is used to describe an application that installs hidden services on a system that enables the attacker to monitor and control the operation of the system?
Trojan
Worm
Virus
Illicit server
Create a free account and access millions of resources
Similar Resources on Quizizz
21 questions
CIW IBA Lesson 8 Vocabulary

Quiz
•
8th Grade - Professio...
18 questions
WJEC GCSE Computer Science - Security

Quiz
•
9th - 10th Grade
20 questions
QUIZ #4 COMPUTER MALWARE

Quiz
•
10th Grade
15 questions
Fundamentals of Cyber Security

Quiz
•
10th Grade
12 questions
CSP I: Unit 8: Lesson 9: Protecting Data Part 2

Quiz
•
9th Grade
20 questions
Cambridge Nationals LO4

Quiz
•
10th Grade
15 questions
Computer viruses

Quiz
•
10th Grade
14 questions
Threat Prevention

Quiz
•
11th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade
Discover more resources for Computers
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
25 questions
Spanish preterite verbs (irregular/changed)

Quiz
•
9th - 10th Grade
10 questions
Identify Slope and y-intercept (from equation)

Quiz
•
8th - 9th Grade
10 questions
Juneteenth: History and Significance

Interactive video
•
7th - 12th Grade
15 questions
Volume Prisms, Cylinders, Cones & Spheres

Quiz
•
8th Grade
8 questions
"Keeping the City of Venice Afloat" - STAAR Bootcamp, Day 1

Quiz
•
9th - 12th Grade
26 questions
June 19th

Quiz
•
4th - 9th Grade