
MST 24 Chapter 6 Quiz
Authored by Maria Teresa Cachero
Computers
University
Used 24+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
It is a (a) is a cybercrime in which a cybercriminal extracts data from a source. (use small letters)
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A (a) is an organization led by government agencies in countries that are in charge with policing internet. (use small letters)
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Spyware is a program or software that will steal information and changing user data.
True
False
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Only the valid information can reach this software.
Auditing
Authentication
Authorization
Cryptography
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
This __ is an assurance of privacy to the user, unauthorized user should not be able to edit, change, copy, or read the information inside the application
Auditing
Authentication
Authorization
Cryptography
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Malware is the process of encoding information wherein only the authorized people can access those information.
True
False
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
This is phishing but via phone call or SMS messages.
Smishing
Malicious Mobile applications
Hijacking advertisements
Social Networking Pages
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?