Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

University

13 Qs

quiz-placeholder

Similar activities

Przestrzeganie prawa i zasad bezpieczeństwa w informatyce

Przestrzeganie prawa i zasad bezpieczeństwa w informatyce

KG - Professional Development

10 Qs

Uji Pengetahuan Keamanan Siber

Uji Pengetahuan Keamanan Siber

9th Grade - University

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

15 Qs

Seguridad Informática Básica

Seguridad Informática Básica

University

10 Qs

 IT ISSUES AND CHALLENGES: INDUSTRY QUIZ

IT ISSUES AND CHALLENGES: INDUSTRY QUIZ

University

10 Qs

ITE-13-Quiz01

ITE-13-Quiz01

University

10 Qs

Cybersecurity Fundamentals Week 3 Quiz

Cybersecurity Fundamentals Week 3 Quiz

KG - University

10 Qs

Computer Science Unit 1 review

Computer Science Unit 1 review

University

12 Qs

 Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

Assessment

Quiz

Computers

University

Hard

Created by

Cindy Philpot

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as ___________________

impersonation theft

identity theft

scareware theft

malware theft

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a_______ attack.

steath

backdoor

denial-of-service

scareware

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Cookies are ___________________

a type of malware used to track websites you visit.

a tool used by “ransomware as a service” programs.

files installed by your operating system to speed up access to the Internet.

small text files written on your hard drive by a website you visited.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A series of commands that are executed without your knowledge is a typical attribute of a(n) ____________ virus.

script

boot-sector

time bomb

encryption

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as ___________________

trackingware

spyware

adware

scareware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Firewalls work by closing ___________________ in your computer.

software gaps

logical ports

logical doors

backdoors

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Antivirus software looks for ___________________ to detect viruses in files.

virus signatures

virus artifacts

virus bots

virus VPNs

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?