Search Header Logo

MST 24 Chapter 6 Quiz

Authored by Maria Teresa Cachero

Computers

University

Used 24+ times

MST 24 Chapter 6 Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a ___ is a cybercrime in which a cybercriminal extracts data from a source. (use small letters)

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A ___ is an organization led by government agencies in countries that are in charge with policing internet. (use small letters)

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Spyware is a program or software that will steal information and changing user data.

True

False

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Only the valid information can reach this software.

Auditing

Authentication

Authorization

Cryptography

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This __ is an assurance of privacy to the user, unauthorized user should not be able to edit, change, copy, or read the information inside the application

Auditing

Authentication

Authorization

Cryptography

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malware is the process of encoding information wherein only the authorized people can access those information.

True

False

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This is phishing but via phone call or SMS messages.

Smishing

Malicious Mobile applications

Hijacking advertisements

Social Networking Pages

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers