Unit 23 DIPIT

Unit 23 DIPIT

University - Professional Development

15 Qs

quiz-placeholder

Similar activities

Trg@home 1

Trg@home 1

Professional Development

10 Qs

Ms. Exel dan Fungsi Logika IF

Ms. Exel dan Fungsi Logika IF

10th Grade - University

15 Qs

2.3.1 Graph Traversal & Path Finding Algorithms

2.3.1 Graph Traversal & Path Finding Algorithms

12th Grade - University

20 Qs

Kuis Pemrograman Dasar

Kuis Pemrograman Dasar

University

20 Qs

Krungsri ESG

Krungsri ESG

University

15 Qs

Traders, Kings and Pilgrims

Traders, Kings and Pilgrims

KG - Professional Development

10 Qs

Law of Agency

Law of Agency

University

11 Qs

ICT Unit-2

ICT Unit-2

University

20 Qs

Unit 23 DIPIT

Unit 23 DIPIT

Assessment

Quiz

Social Studies, Computers

University - Professional Development

Practice Problem

Hard

Created by

Shamy Shabeer

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

What is the difference between verification and validation??

Validation checks that the data you have entered matches the data you were given to enter. Verification checks that all the rules applied to that data are met

Validation checks that the correct type of data is entered, whereas verification checks that the data is actually the data you want

Verification checks that the correct type of data is entered, whereas validation checks that the data is actually the data you want

Verification checks the virus whereas validation checks the data.

2.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Which is an example of a gateway ?    

Router

Switch

Firewall

Hub

3.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

What Malicious code activated by a specific event is called? (23KLO 1.1d)

DDoS

Trojan

Logic bomb

Phishing email

4.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

 Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?

Phishing

Botnet

Scan

Encryption

5.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Malicious software collecting information about users without their knowledge/consent is known as:

 Spyware

 Eavesdropping

 Hacking Profiles

Profile

6.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Which of the following answers lists an example of spyware

Keylogger

Virus

DDoS

Worm

7.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called

Spam

Spyware

Worm

Trojan

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?