Search Header Logo

CHAPTER 4 Quiz

Authored by Ahmed Ali

Other

University

Used 3+ times

CHAPTER 4 Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

………………… “of Salma means that she wants to have control over her personal possessions and not to be observed without her consent

Confidentiality

   Privacy

   Information policies

A.     Information technology

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

AMNA bought a new copyrighted program and shared the license key with her friends while the license of the program states that it is for a single user. This program is

Ethical software

Free software

Counterfeit software

Pirated Software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Every time WAFA goes to a website, a file is created on her computer that contains some information about her like her username and the items she added to the shopping cart. This file is a :

Adware

Cookie

Clickstream

Virus

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One of the following can be used as an attacking tool in the context of information security

Firewall

Keystroke Logger

Virtual Private network

Intrusion detection system

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Organizations should have ......... to secure the access to the internal network from unauthorized users on the internet

Anti-spam policy

Master data management

Firewall

 Antivirus

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DOAA works in a hospital. DOAA asked a nurse for her user id and password to check the results for her husband medical exam, DOAA act is considered

Phishing

Pharming

Social engineering

Pretexting

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The main difference between the worm and the virus is that

A worm must attach to something, such as an executable file, to spread. Viruses do not need to attach to anything to spread

 A virus must attach to something, such as an executable file, to spread. Worms. do not need to attach to anything to spread

No difference between them

None of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?