Privacy, Security & Ethics

Privacy, Security & Ethics

University

25 Qs

quiz-placeholder

Similar activities

MIDTERM-SW1

MIDTERM-SW1

University

20 Qs

Cloud Architecting - Week 3

Cloud Architecting - Week 3

University

20 Qs

Legislation and Computers

Legislation and Computers

University

20 Qs

LVTR M13 Internet of Things

LVTR M13 Internet of Things

University

20 Qs

ETHICAL, LEGAL, AND SOCIAL ISSUES OF INFORMATION TECHNOLOGY

ETHICAL, LEGAL, AND SOCIAL ISSUES OF INFORMATION TECHNOLOGY

University

20 Qs

COMPUTER ETHICS

COMPUTER ETHICS

University

21 Qs

Week 11 - Stategy & Planning

Week 11 - Stategy & Planning

University

20 Qs

038_Mobile Device Vulnerabilities – CompTIA Security+ SY0-701

038_Mobile Device Vulnerabilities – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

Privacy, Security & Ethics

Privacy, Security & Ethics

Assessment

Quiz

Computers

University

Medium

Created by

Fuhaina Ahmad

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of malicious programs or malware?

  • To enhance computer performance

  • To assist in data encryption

  • To damage or disrupt a computer system

  • To create secure networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common characteristic of worms?

  • Disguised as something else

  • Attaches to different programs

  • Fills the computer with self-replicating information

  • Spreads through unauthorized Wi-Fi networks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Botnet or Robot Network composed of?

  • Fingerprint scanners

  • Zombies

  • Encryption keys

  • Rogue Wi-Fi hotspots

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Discuss the three most common malicious programs – viruses, worms, and Trojan horses. Explain how each operates and the potential damage they can cause to computer systems

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe the principles and key components of a disaster recovery plan. How does such a plan contribute to maintaining business continuity in the face of unforeseen events or disasters?

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption protocol is commonly used to secure websites?

  • WPA2

  • HTTPS

  • VPN

  • Trojan Horse

7.

OPEN ENDED QUESTION

3 mins • 1 pt

How do archiving and search features on the web contribute to the challenges of maintaining online privacy?

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?