Tutorial 8 Security

Tutorial 8 Security

University

15 Qs

quiz-placeholder

Similar activities

Jeffy

Jeffy

KG - Professional Development

10 Qs

PLANNING + STEPS

PLANNING + STEPS

University

12 Qs

environmental education

environmental education

University

10 Qs

KNOW YOURSELF KNOW YOUR LIMIT

KNOW YOURSELF KNOW YOUR LIMIT

KG - Professional Development

10 Qs

GLS290 Aerial Camera

GLS290 Aerial Camera

University

10 Qs

หลักการเขียนบรรณานุกรม

หลักการเขียนบรรณานุกรม

University

10 Qs

Rehab 105 Short Quiz 4 - Endterms

Rehab 105 Short Quiz 4 - Endterms

University

20 Qs

CCHU5001_Week 3_Quiz

CCHU5001_Week 3_Quiz

University

10 Qs

Tutorial 8 Security

Tutorial 8 Security

Assessment

Quiz

Education, Instructional Technology, Other

University

Practice Problem

Medium

Created by

TechMan TechMan

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

1. What is another name for junk e-mails?

Archive

Spam

Inbox

Outbox

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

2. True or False: The speed of computers can intensify mistakes.

True

False

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

3. The first step to prevent computer-related waste is to establish ____________________ and ____________________ regarding efficient acquisition, use, and disposal of systems and devices.

policies, procedures

organisations, procedures

policies, regulations

operations, rules

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

4. True or False: One common policy for minimizing waste and mistakes is that each system report should indicate its general content in its title and specify the time it covers.

True

False

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

5. Many organizations implement internal ____________________ to measure actual results against established goals.

Accounting

Human Resources

Audits

Insourcing

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

6. __________________ is the practice of using one’s social skills to get computer users to provide information to access an information system.

Hacking

Shoulder Surfing

Phishing

Social engineering

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

7. ____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.

Social Engineering

Identity theft

Malware

Phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Education