202309 BMIT27x3 Revision Quiz 3

202309 BMIT27x3 Revision Quiz 3

University

28 Qs

quiz-placeholder

Similar activities

CSC134_Chapter 6: Application Software

CSC134_Chapter 6: Application Software

University

30 Qs

Autodesk Fusion 360 Skills Check

Autodesk Fusion 360 Skills Check

9th Grade - University

31 Qs

MIS-200 - Chapter 5 IT Infastructure

MIS-200 - Chapter 5 IT Infastructure

University

24 Qs

Web Searches and Key Terms

Web Searches and Key Terms

7th Grade - University

33 Qs

File Management

File Management

1st Grade - University

30 Qs

Quiz 2  WordPress Intro

Quiz 2 WordPress Intro

8th Grade - University

24 Qs

Rules and Expectations

Rules and Expectations

9th Grade - University

25 Qs

Management Information Systems Quiz

Management Information Systems Quiz

University

23 Qs

202309 BMIT27x3 Revision Quiz 3

202309 BMIT27x3 Revision Quiz 3

Assessment

Quiz

Computers

University

Medium

Created by

MOR ONG

Used 31+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a legal form of hacking.

Contemporary hacking

Ethical hacking

Modern hacking

Modern hijacking

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A _____ is a special area to store infected files where the malware is not removable at the point of detection. Files stored in this area will not cause any harm to the computer system.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the followings will not increase the outbreak of spam emails to other users?

Spammers find emailing to be an inexpensive.

Employees respond to spam advertisements.

Spammers send junk emails frequently.

Educated users choose to ignore and delete the unsolicited messages.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A web filter is a software that _____

keeps track of the pages of your web browser displays.

sends Google and Microsoft information about your web surfing habits.

prevents unauthorized people from using your computer to surf the web.

prevents certain web pages from being displayed by your browser.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following conditions in workplace might turn a trusted user into a malicious insider? (multiple answers)

Stress at work

Frustration with superiors and colleagues

Financial problem

Job promotion

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a combination of the two words, “robot” and “network”. It refers to a number of Internet-

connected devices, each of which is running one or more bots. They can be used to perform

DDoS attacks, steal data, send spam, etc.

RobNet

BotNet

ZomNet

DosNet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the followings can be considered as a vulnerability of instant messaging?

Attachment may carry malware

Slow delivery of messages

Unavailability of privacy checkup facility

Outdated instant messaging software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?