Securing Your System: Protecting Your Digital Data and Devices

Securing Your System: Protecting Your Digital Data and Devices

University

30 Qs

quiz-placeholder

Similar activities

OPERATING_SYSTEMS

OPERATING_SYSTEMS

University

25 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

30 Qs

PAS SMT GENAP/PAT SMK KLS XI

PAS SMT GENAP/PAT SMK KLS XI

11th Grade - University

33 Qs

Introduction to Computers

Introduction to Computers

University

25 Qs

Midterm Exam

Midterm Exam

University

25 Qs

Relativsatz

Relativsatz

University

35 Qs

ICT-Department-Grade5-November

ICT-Department-Grade5-November

5th Grade - University

29 Qs

Etika Profesi - UL501P

Etika Profesi - UL501P

University

25 Qs

Securing Your System: Protecting Your Digital Data and Devices

Securing Your System: Protecting Your Digital Data and Devices

Assessment

Quiz

Education, Computers

University

Medium

Created by

Zakiah Noh

Used 9+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

Social networking

Cybercrime

Phishing

Hacking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a virus category?

Worm

Logic bomb

Macro

Pharming

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All of the following activities may infect your computer with a virus EXCEPT

sharing flash drives

downloading video files from peer-to-peer sites

downloading or running an e-mail attachment file

printing a document

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 A ________ is a virus that is triggered on a certain date.

worm

macro

logic bomb

time bomb

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following classifications of viruses can change its own code to avoid detection?

Stealth

Multipartite

Polymorphic

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Regarding computer protection, quarantining is defined as ________.

updating your antivirus software

placing a found virus in a secure area on the hard drive

repairing an infected file

deleting an infected file

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

Black-hat

Grey-hat

White-hat

Green-hat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?