CS Final Exam Answer  Sheet

CS Final Exam Answer Sheet

University

14 Qs

quiz-placeholder

Similar activities

mendeley : manajemen sitasi

mendeley : manajemen sitasi

University

15 Qs

Unit 2 Review

Unit 2 Review

9th Grade - University

15 Qs

elments of rash

elments of rash

University

11 Qs

Element or Compound

Element or Compound

6th Grade - University

15 Qs

Mineral Characteristics and Properties

Mineral Characteristics and Properties

8th Grade - University

15 Qs

Woodland Food Web Quiz

Woodland Food Web Quiz

7th Grade - University

10 Qs

Evaluare sumativa HTML

Evaluare sumativa HTML

University

18 Qs

Testez vos connaissances en HTML et CSS

Testez vos connaissances en HTML et CSS

4th Grade - University

14 Qs

CS Final Exam Answer  Sheet

CS Final Exam Answer Sheet

Assessment

Quiz

Science

University

Medium

NGSS
HS-PS4-5

Standards-aligned

Created by

Tarase Mcgee

Used 20+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the best countermeasure against social engineering?

Acceptable use policy

User awareness training

Strong passwords

Access auditing

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Anna, a user, downloaded a free pdf editing application from the internet. Now the laptop constantly displays desktop popups and several applications won't start.

Anna was the victim of which of the following?

Trojan horse

Social engineering

Worm

Spyware

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user is unable to read their computer files. A pop-up explains that the files have been encrypted and gives

instructions on how to purchase a decryption key. Which of the following BEST describes this malware?

Trojan horse

Ransomware

Spyware

Social engineering

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is it better to use a credit card than a debit card for online purchases?

Credit cards have better interest rates

Credit cards keep track of all your transactions

Credit cards have better fraud protection

Debit cards require you to pay additional fees

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively

known as_______

Spam

Illegal messages

Bloatware

Cookies

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following security measures is a form of biometrics?

Chassis intrusion detection

BIOS password

Fingerprint scanner

TPM

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following components of a successful access control framework is the process of proving that you are who you say you are?

Authentication

Access control

Accounting

Authorization

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?