Tutorial 8 Security

Tutorial 8 Security

University

15 Qs

quiz-placeholder

Similar activities

Quiz IoT - Kecerdasan Buatan

Quiz IoT - Kecerdasan Buatan

University

15 Qs

Ice Breaker

Ice Breaker

University

10 Qs

HCI - 1.1 & 1.2 Introduction To HCI

HCI - 1.1 & 1.2 Introduction To HCI

University

10 Qs

ICT 9 Q4 M5

ICT 9 Q4 M5

9th Grade - University

15 Qs

Interaktion: Psyche & Nervensystem

Interaktion: Psyche & Nervensystem

University

11 Qs

QUIZ2 DEC40053

QUIZ2 DEC40053

University

10 Qs

Chapter 1: Introduction to Human Computer Interaction

Chapter 1: Introduction to Human Computer Interaction

University

10 Qs

DSL-206 Chap 19: Quiz Electrical Wiring and Diagrams

DSL-206 Chap 19: Quiz Electrical Wiring and Diagrams

University

20 Qs

Tutorial 8 Security

Tutorial 8 Security

Assessment

Quiz

Education, Instructional Technology, Other

University

Medium

Created by

TechMan TechMan

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

1. What is another name for junk e-mails?

Archive

Spam

Inbox

Outbox

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

2. True or False: The speed of computers can intensify mistakes.

True

False

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

3. The first step to prevent computer-related waste is to establish ____________________ and ____________________ regarding efficient acquisition, use, and disposal of systems and devices.

policies, procedures

organisations, procedures

policies, regulations

operations, rules

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

4. True or False: One common policy for minimizing waste and mistakes is that each system report should indicate its general content in its title and specify the time it covers.

True

False

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

5. Many organizations implement internal ____________________ to measure actual results against established goals.

Accounting

Human Resources

Audits

Insourcing

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

6. __________________ is the practice of using one’s social skills to get computer users to provide information to access an information system.

Hacking

Shoulder Surfing

Phishing

Social engineering

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

7. ____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.

Social Engineering

Identity theft

Malware

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?