
Securing Your System: Protecting Your Digital Data and Devices
Authored by Zakiah Noh
Education, Computers
University
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
Social networking
Cybercrime
Phishing
Hacking
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a virus category?
Worm
Logic bomb
Macro
Pharming
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
All of the following activities may infect your computer with a virus EXCEPT
sharing flash drives
downloading video files from peer-to-peer sites
downloading or running an e-mail attachment file
printing a document
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ________ is a virus that is triggered on a certain date.
worm
macro
logic bomb
time bomb
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following classifications of viruses can change its own code to avoid detection?
Stealth
Multipartite
Polymorphic
Worm
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Regarding computer protection, quarantining is defined as ________.
updating your antivirus software
placing a found virus in a secure area on the hard drive
repairing an infected file
deleting an infected file
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.
Black-hat
Grey-hat
White-hat
Green-hat
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?