UIT 2221 ICT SFETY AND SECURITY (COPTPA)

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

University

10 Qs

quiz-placeholder

Similar activities

Information System and Modern Organization part 1

Information System and Modern Organization part 1

University

14 Qs

Intro 2 Docker

Intro 2 Docker

12th Grade - University

10 Qs

Operating System Fun Review

Operating System Fun Review

University

10 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

Fun with Computer Architecture

Fun with Computer Architecture

University

15 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

C++ Array Quiz

C++ Array Quiz

University

10 Qs

Desain Brief

Desain Brief

University

10 Qs

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

CHE (IKBN-KEMASIK)

Used 15+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

- It is an important aspect of ethical issues in information technology.

- IT facilitates the users having their own hardware, operating system and software tools to access the servers that are connected to each other and to the users by a network.

Access Right

Personal Privacy

Harmful Actions

Patents

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

- It is more difficult to deal with these types of ethical issues.

- A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining a copyright.

Trade Secrets

Copyright

Patents

Access Right

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

- One should be aware of the liability issue in making ethical decisions.

- Software developer makes promises and assertions to the user about the nature andqualityoftheproductthatcanberestrictedasanexpresswarranty.

Liability

Trade Secrets

Piracy

Copyright

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Hackers can use it to:

> Delete, modify and capture data

> Harvest your device as part of a botnet

> Spy on your device

> Gainaccesstoyournetwork

Ransomware

Trojans

Spyware

Worm

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

.................is malicious software that denies or restricts access to your own files. Then it demands payment (usually with crypto-currencies) in return for letting you back in.

Adware & Malvertising

Spyware

Worm

Ransomware

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

________________ help hackers with all manner of malicious activities, including:

·       DDoS attacks

·       Keylogging, screenshots and webcam access

·       Spreading other types of malware

·       Sending spam and phishing messages

Bots & Botnets

Ransomware

Backdoor

Spyware

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

The figure is about.......

Malvertising is the use of adware to spread malware

 

Spyware hides on a device and secretly records your online activity, harvesting your data and collecting personal information

The structure of Botnet

Backdoor Bypassing Security To Gain Access To A Restricted Part Of A Computer System

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?