Privacy, Security & Ethics

Privacy, Security & Ethics

University

25 Qs

quiz-placeholder

Similar activities

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

PHP First Internal Practical Viva

PHP First Internal Practical Viva

University

20 Qs

ICT WEBINAR QUIZ

ICT WEBINAR QUIZ

KG - Professional Development

20 Qs

ISPM2  Quiz 1

ISPM2 Quiz 1

University

20 Qs

Industrial Electronics Prelim Quiz 1

Industrial Electronics Prelim Quiz 1

University

20 Qs

Quiz UTS Mata Pelajaran Sistem Komputer

Quiz UTS Mata Pelajaran Sistem Komputer

9th Grade - University

20 Qs

Empowerment Technologies (Set 2) - by Sir Dave

Empowerment Technologies (Set 2) - by Sir Dave

11th Grade - University

20 Qs

Privacy, Security & Ethics

Privacy, Security & Ethics

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Fuhaina Ahmad

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of malicious programs or malware?

  • To enhance computer performance

  • To assist in data encryption

  • To damage or disrupt a computer system

  • To create secure networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common characteristic of worms?

  • Disguised as something else

  • Attaches to different programs

  • Fills the computer with self-replicating information

  • Spreads through unauthorized Wi-Fi networks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Botnet or Robot Network composed of?

  • Fingerprint scanners

  • Zombies

  • Encryption keys

  • Rogue Wi-Fi hotspots

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Discuss the three most common malicious programs – viruses, worms, and Trojan horses. Explain how each operates and the potential damage they can cause to computer systems

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe the principles and key components of a disaster recovery plan. How does such a plan contribute to maintaining business continuity in the face of unforeseen events or disasters?

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption protocol is commonly used to secure websites?

  • WPA2

  • HTTPS

  • VPN

  • Trojan Horse

7.

OPEN ENDED QUESTION

3 mins • 1 pt

How do archiving and search features on the web contribute to the challenges of maintaining online privacy?

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?