Quiz on Network and Internet Privacy and Security

Quiz on Network and Internet Privacy and Security

University

20 Qs

quiz-placeholder

Similar activities

DreamWeaver CS6

DreamWeaver CS6

University

20 Qs

Software Engineering-1

Software Engineering-1

University

20 Qs

DAA quiz2

DAA quiz2

University

15 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

Python Quiz For Starters

Python Quiz For Starters

3rd Grade - Professional Development

17 Qs

Multimedia Video & Animation

Multimedia Video & Animation

University

20 Qs

Django-quiz

Django-quiz

5th Grade - University

20 Qs

21CSC305P - Machnine Learning - Quiz

21CSC305P - Machnine Learning - Quiz

University

15 Qs

Quiz on Network and Internet Privacy and Security

Quiz on Network and Internet Privacy and Security

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Natalie Landicho

Used 14+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of program would a hacker use to capture the password someone has typed?

keylooker

keylogger

keyloader

keyblocker

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of malware are designed to infect multiple files on your computer?

Worm

Virus

Trojan

Rogue Wi-fi

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A wireless network that “sniffs” traffic, making a copy of everything users type—

including usernames, passwords, and credit card numbers.

Worm

Virus

Trojan

Rogue Wi-fi

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of malware is likely to use your address book to spread itself to other computers?

Worm

Virus

Trojan

Rogue Wi-fi

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be the strongest password?

August23

birmingham

NewYork

M3rl1n@t

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of a single piece of software that looks innocent but carries out malicious activity on your computer?

Worm

Virus

Trojan

Rogue Wi-fi

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best approach to controlling access to data?

Give users as much access as they need.

Only give users the minimum access they need.

Allow users to decide how much access they need.

Don’t give users any access.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?