CP N5 - Module 1, 5, 8

CP N5 - Module 1, 5, 8

KG

20 Qs

quiz-placeholder

Similar activities

Forms of Network Attack

Forms of Network Attack

10th Grade

18 Qs

FCS0063 CHAPTER 2 SYSTEM UNIT

FCS0063 CHAPTER 2 SYSTEM UNIT

University

20 Qs

NETWORK SECURITY

NETWORK SECURITY

8th - 10th Grade

15 Qs

Malware

Malware

9th - 11th Grade

15 Qs

L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

University

17 Qs

Network and Internet Security

Network and Internet Security

University

20 Qs

Network and Mobile devices

Network and Mobile devices

7th - 10th Grade

15 Qs

Consequences of a cyber security attack

Consequences of a cyber security attack

10th - 12th Grade

15 Qs

CP N5 - Module 1, 5, 8

CP N5 - Module 1, 5, 8

Assessment

Quiz

Computers

KG

Medium

Created by

Tino Constance

Used 20+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A PAN is a network that covers a large geographical area.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Storage is the data is entered into the computer

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

RAM is the temporary memory of the computer

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Web browsers are apps that are used to access the internet

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

People who are tricked into revealing their personal information to criminals is referred to as...

Phishing

Bandwidth theft

Pharming

Identity theft

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is not a type of network?

LAN

WAN

GAN

SAN

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When you change the attributes of a file so that it cannot be changed

Hidden

Read-only

=COUNT

Bluetooth

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?