Unit 23 DIPIT

Unit 23 DIPIT

University - Professional Development

15 Qs

quiz-placeholder

Similar activities

SYO 701 EDR Module FC

SYO 701 EDR Module FC

University

20 Qs

Cloud Security

Cloud Security

University

10 Qs

Activity 1 - IAS 101

Activity 1 - IAS 101

University

12 Qs

SSK30343 CNS

SSK30343 CNS

University

15 Qs

Information and Communication Technology Security - Pre-Test

Information and Communication Technology Security - Pre-Test

University

20 Qs

Chapter 2:The Cybersecurity Cube

Chapter 2: The Cybersecurity Cube

Professional Development

12 Qs

101-120

101-120

Professional Development

20 Qs

Summer_OOSW_1

Summer_OOSW_1

University

10 Qs

Unit 23 DIPIT

Unit 23 DIPIT

Assessment

Quiz

Social Studies, Computers

University - Professional Development

Hard

Created by

Shamy Shabeer

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

What is the difference between verification and validation??

Validation checks that the data you have entered matches the data you were given to enter. Verification checks that all the rules applied to that data are met

Validation checks that the correct type of data is entered, whereas verification checks that the data is actually the data you want

Verification checks that the correct type of data is entered, whereas validation checks that the data is actually the data you want

Verification checks the virus whereas validation checks the data.

2.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Which is an example of a gateway ?    

Router

Switch

Firewall

Hub

3.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

What Malicious code activated by a specific event is called? (23KLO 1.1d)

DDoS

Trojan

Logic bomb

Phishing email

4.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

 Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?

Phishing

Botnet

Scan

Encryption

5.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Malicious software collecting information about users without their knowledge/consent is known as:

 Spyware

 Eavesdropping

 Hacking Profiles

Profile

6.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Which of the following answers lists an example of spyware

Keylogger

Virus

DDoS

Worm

7.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called

Spam

Spyware

Worm

Trojan

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?