Search Header Logo

Cyber Security and E Commerce

Authored by Carmen James

Business

10th - 12th Grade

Used 25+ times

Cyber Security and E Commerce
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

47 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An Antivirus protects you from all attacks

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

Malicious Code

Computer Worm

Anti Virus Software

Computer Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is the type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.

Computer Virus

Computer Worm

MyDoom

Malicious Code

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does malware get onto your computer?

Email attachments or links
By visiting dodgy websites
On USB sticks
All of the above

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of these are common methods that could be used to infect a computer with malware?

spam email

out of date firewall

Distributed denial of service

bookmarking a page

variable computer synchroniser

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which apply to phishing?

The art of catching aquatic animals with a rod

Using a malicious medium, disguised as a trustworthy source, to get users to reveal personal information

Physically threatening someone until they give up personal data

Personally hacking someone to get personal information

Usually an attack made via email

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are ways that an operating system can increase system security?

Offering the use of password protection

Different levels of user access

Keeping software updated

Disk Defragmentation

The use of virtual memory

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?