Search Header Logo

Seminar

Authored by Nicole Baltazar

Computers

University

Used 1+ times

Seminar
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to refer to the security offered through online services
to protect your online information?

Cyberattack

Data breach

Cybersecurity

Online encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT included in the three key aspects of data and
information security?

Confidentiality

Reliability

Availability

Integrity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which combining form relates to information technology, the Internet,

and virtual reality?

Cyber

IT

Tech

Web

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of cybersecurity, what is described as "a link in the chain &

maybe the first line of defense"?

Firewall

Antivirus software

People

Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a program that is loaded onto your computer without your

knowledge and runs against your wishes?

Firewall

Antivirus software

Operating system

Virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a person who breaks into computers, usually by gaining

access to administrative controls?

Hacker

IT Specialist

Programmer

Analyst

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is any software that infects and damages a computer system without the owner's

knowledge or permission?

Firewall

Antivirus software

Malware

Operating system

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?