Computer Security

Computer Security

University

10 Qs

quiz-placeholder

Similar activities

AD1202 ISE - Telecommunication and Network

AD1202 ISE - Telecommunication and Network

University

9 Qs

Internet Technology

Internet Technology

10th Grade - University

10 Qs

Intruders Attacks on Network and Computers

Intruders Attacks on Network and Computers

University

15 Qs

Introduction to ICT

Introduction to ICT

University

15 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Introduction to Computer Science

Introduction to Computer Science

University

10 Qs

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

8th Grade - University

14 Qs

Informational Technology

Informational Technology

12th Grade - University

15 Qs

Computer Security

Computer Security

Assessment

Quiz

Computers

University

Hard

Created by

AJ SpaceICT

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
network compromise
information liability
technical terrorism
digital security risk

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The software used by cybercriminals is called _______________.
cyberware
conware
criminalware
crimeware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
cyberterrorist
script kiddie
cracker
cyberextortionist

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following statements is not true about Internet and network attacks?
No central administrator is present on the Internet.
It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is not true about software theft?
A keygen distributes usernames and passwords to those who register their legally purchased copies of a software program.
Software piracy is the unauthorized and illegal duplication of copyrighted software.
With a single-user license agreement, users are permitted to make one copy of the software as a backup.
Software theft includes disabling or removing programs from company computers.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
a virus
a worm
a Trojan horse
a rootkit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens during a distributed denial-of-service (DDoS) attack?
An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic.
Antivirus software disables viruses and protects the computer or network from unauthorized access.
The police use a virus and other measures to take down a network of computer criminals.
A zombie army is used to attack computers or computer networks.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?