Cyber Security and E Commerce

Cyber Security and E Commerce

10th - 12th Grade

47 Qs

quiz-placeholder

Similar activities

Chapter 3 Purchasing Power

Chapter 3 Purchasing Power

10th - 12th Grade

44 Qs

EDPM PRACTICE QUIZ

EDPM PRACTICE QUIZ

10th Grade

50 Qs

TEMA 5. estructura económico-financiera

TEMA 5. estructura económico-financiera

12th Grade

45 Qs

Travel Final Review

Travel Final Review

9th - 12th Grade

50 Qs

PERNIAGAAN TINGKATAN 5 BAB 1- BAB 4

PERNIAGAAN TINGKATAN 5 BAB 1- BAB 4

12th Grade

50 Qs

PAS Humas Kelas 11

PAS Humas Kelas 11

11th Grade

50 Qs

INDIAN ECONOMY ON THE EVE OF INDEPENDENCE

INDIAN ECONOMY ON THE EVE OF INDEPENDENCE

12th Grade

50 Qs

IGCSE BUSINESS Revision:  UNIT 2 H.R. 100

IGCSE BUSINESS Revision: UNIT 2 H.R. 100

10th - 11th Grade

50 Qs

Cyber Security and E Commerce

Cyber Security and E Commerce

Assessment

Quiz

Business

10th - 12th Grade

Practice Problem

Hard

Created by

Carmen James

Used 23+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

47 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An Antivirus protects you from all attacks

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

Malicious Code

Computer Worm

Anti Virus Software

Computer Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is the type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.

Computer Virus

Computer Worm

MyDoom

Malicious Code

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does malware get onto your computer?

Email attachments or links
By visiting dodgy websites
On USB sticks
All of the above

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of these are common methods that could be used to infect a computer with malware?

spam email

out of date firewall

Distributed denial of service

bookmarking a page

variable computer synchroniser

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which apply to phishing?

The art of catching aquatic animals with a rod

Using a malicious medium, disguised as a trustworthy source, to get users to reveal personal information

Physically threatening someone until they give up personal data

Personally hacking someone to get personal information

Usually an attack made via email

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are ways that an operating system can increase system security?

Offering the use of password protection

Different levels of user access

Keeping software updated

Disk Defragmentation

The use of virtual memory

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?