MST 24 Chapter 6 Quiz

MST 24 Chapter 6 Quiz

University

15 Qs

quiz-placeholder

Similar activities

CN3303 - Lecture 9: Cloud Security threats

CN3303 - Lecture 9: Cloud Security threats

University

10 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

University

10 Qs

Cloud Architecting - Week 5

Cloud Architecting - Week 5

University

20 Qs

Hackers?

Hackers?

University

20 Qs

Computer Security Risk

Computer Security Risk

11th Grade - University

16 Qs

Cloud Computing

Cloud Computing

University

11 Qs

Data Breach Quiz

Data Breach Quiz

University

12 Qs

MST 24 Chapter 6 Quiz

MST 24 Chapter 6 Quiz

Assessment

Quiz

Computers

University

Easy

Created by

Maria Teresa Cachero

Used 24+ times

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a ___ is a cybercrime in which a cybercriminal extracts data from a source. (use small letters)

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A ___ is an organization led by government agencies in countries that are in charge with policing internet. (use small letters)

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Spyware is a program or software that will steal information and changing user data.

True

False

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Only the valid information can reach this software.

Auditing

Authentication

Authorization

Cryptography

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This __ is an assurance of privacy to the user, unauthorized user should not be able to edit, change, copy, or read the information inside the application

Auditing

Authentication

Authorization

Cryptography

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malware is the process of encoding information wherein only the authorized people can access those information.

True

False

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This is phishing but via phone call or SMS messages.

Smishing

Malicious Mobile applications

Hijacking advertisements

Social Networking Pages

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?