DFS4143 CHAPTER 2 QUIZ

DFS4143 CHAPTER 2 QUIZ

1st - 3rd Grade

10 Qs

quiz-placeholder

Similar activities

Data Communication

Data Communication

1st Grade

10 Qs

ice breaking kemampuan awal

ice breaking kemampuan awal

1st - 12th Grade

10 Qs

grade 3 internet quiz

grade 3 internet quiz

2nd - 4th Grade

14 Qs

Quiz Cadangan - Day 1

Quiz Cadangan - Day 1

1st - 3rd Grade

7 Qs

Seguridad en los sistemas de informacion

Seguridad en los sistemas de informacion

1st - 3rd Grade

9 Qs

Module 3

Module 3

3rd Grade

15 Qs

Ict/cyberterrorism

Ict/cyberterrorism

KG - Professional Development

9 Qs

Fun Quiz (Security) - KV

Fun Quiz (Security) - KV

3rd Grade

10 Qs

DFS4143 CHAPTER 2 QUIZ

DFS4143 CHAPTER 2 QUIZ

Assessment

Quiz

Computers

1st - 3rd Grade

Hard

Created by

SITI SUKAIMI

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the technique used to search for weaknesses in order to apply a patch of fix a code of an application.

Threat identification

Vulnerability Assessment

Diversionary tactic

Threat assessment

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the type of attack that uses more than one computer to attack the victim.

Denial of Service (DOS) Attack

Malware Attack

Distributed Denial of Service (DOS) Attack

User Datagram Protocol (UDP) Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hardware and software system that contain design flaws that can be exploited

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Poor management in network refers to system that are incorrectly configured, and therefore vulnerable to attack

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This individual is involved in aggressive plays and creates trouble to computers. This individual doesn’t like to explore and gain knowledge from their activities. His purpose is to harm the computer.

Attacker

Hacker

Phisher

Spoofer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attempt to gain access to information without authorization is called __________________.

Reconnaissance Attack

Malicious Code Attack

Denial of Service Attack

Access Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the CORRECT threat for a program that take up storage space and memory in your computer which may slow it down.

Malware

Virus

Spam

Phising

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?