DFS4143 CHAPTER 2 QUIZ

DFS4143 CHAPTER 2 QUIZ

1st - 3rd Grade

10 Qs

quiz-placeholder

Similar activities

R001 - Network Devices

R001 - Network Devices

1st - 9th Grade

12 Qs

The Internet

The Internet

3rd Grade

9 Qs

Digital Devices

Digital Devices

1st - 12th Grade

15 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

Data Communication

Data Communication

3rd Grade

15 Qs

Cyber Security Quiz

Cyber Security Quiz

1st - 5th Grade

10 Qs

Cybersecurity Fundamentals Week 1 Quiz

Cybersecurity Fundamentals Week 1 Quiz

KG - University

10 Qs

Cyber Security Malware Social Engineering

Cyber Security Malware Social Engineering

3rd Grade

12 Qs

DFS4143 CHAPTER 2 QUIZ

DFS4143 CHAPTER 2 QUIZ

Assessment

Quiz

Computers

1st - 3rd Grade

Hard

Created by

SITI SUKAIMI

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the technique used to search for weaknesses in order to apply a patch of fix a code of an application.

Threat identification

Vulnerability Assessment

Diversionary tactic

Threat assessment

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the type of attack that uses more than one computer to attack the victim.

Denial of Service (DOS) Attack

Malware Attack

Distributed Denial of Service (DOS) Attack

User Datagram Protocol (UDP) Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hardware and software system that contain design flaws that can be exploited

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Poor management in network refers to system that are incorrectly configured, and therefore vulnerable to attack

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This individual is involved in aggressive plays and creates trouble to computers. This individual doesn’t like to explore and gain knowledge from their activities. His purpose is to harm the computer.

Attacker

Hacker

Phisher

Spoofer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attempt to gain access to information without authorization is called __________________.

Reconnaissance Attack

Malicious Code Attack

Denial of Service Attack

Access Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the CORRECT threat for a program that take up storage space and memory in your computer which may slow it down.

Malware

Virus

Spam

Phising

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?