Privacy, Security & Ethics

Privacy, Security & Ethics

University

25 Qs

quiz-placeholder

Similar activities

Quiz Pra UAS Jaringan Komputer - Radian Baratasena

Quiz Pra UAS Jaringan Komputer - Radian Baratasena

University

20 Qs

จริยธรรมในการใช้เทคโนโลยีสารสนเทศ

จริยธรรมในการใช้เทคโนโลยีสารสนเทศ

University

20 Qs

202309 BMIT27x3 Revision Quiz 3

202309 BMIT27x3 Revision Quiz 3

University

28 Qs

Soal AIJ bulan Agustus 2019 kls xii

Soal AIJ bulan Agustus 2019 kls xii

University

20 Qs

PIK Kg Kadazan ICT & KDB Quiz - March 2021

PIK Kg Kadazan ICT & KDB Quiz - March 2021

1st Grade - Professional Development

20 Qs

5th Quiz

5th Quiz

University

20 Qs

Data Mining (Quiz 1)

Data Mining (Quiz 1)

University

20 Qs

Cloud computing Test

Cloud computing Test

University

20 Qs

Privacy, Security & Ethics

Privacy, Security & Ethics

Assessment

Quiz

Computers

University

Medium

Created by

Fuhaina Ahmad

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of malicious programs or malware?

  • To enhance computer performance

  • To assist in data encryption

  • To damage or disrupt a computer system

  • To create secure networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common characteristic of worms?

  • Disguised as something else

  • Attaches to different programs

  • Fills the computer with self-replicating information

  • Spreads through unauthorized Wi-Fi networks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Botnet or Robot Network composed of?

  • Fingerprint scanners

  • Zombies

  • Encryption keys

  • Rogue Wi-Fi hotspots

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Discuss the three most common malicious programs – viruses, worms, and Trojan horses. Explain how each operates and the potential damage they can cause to computer systems

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe the principles and key components of a disaster recovery plan. How does such a plan contribute to maintaining business continuity in the face of unforeseen events or disasters?

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption protocol is commonly used to secure websites?

  • WPA2

  • HTTPS

  • VPN

  • Trojan Horse

7.

OPEN ENDED QUESTION

3 mins • 1 pt

How do archiving and search features on the web contribute to the challenges of maintaining online privacy?

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?