
Network Issues and Communication
Authored by Sumanraj Subramaniam
Computers
10th Grade
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is hacking?
Getting sensitive
information by mimicking
a reliable webpage on the network
Unauthorized access of a computer system or network.
Malicious code installed on a user’s computer which will redirect the user to a fake website.
Program code that replicates with the intention of deleting or corrupting files.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
Getting sensitive
information by mimicking
a reliable webpage on the network
Unauthorized access of a computer system or network.
Malicious code installed on a user’s computer which will redirect the user to a fake website.
Program code that replicates with the intention of deleting or corrupting files.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is pharming?
Getting sensitive
information by mimicking
a reliable webpage on the network
Unauthorized access of a computer system or network.
Malicious code installed on a user’s computer which will redirect the user to a fake website.
Program code that replicates with the intention of deleting or corrupting files.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is virus?
Getting sensitive
information by mimicking
a reliable webpage on the network
Unauthorized access of a computer system or network.
Malicious code installed on a user’s computer which will redirect the user to a fake website.
Program code that replicates with the intention of deleting or corrupting files.
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Select all the method that enhances the security of a password.
Password is changed regularly.
Password uses a combination of numbers, letters and symbols.
Password for all accounts is kept the same.
Password uses personal data such as date of birth.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Select all the other authentication methods available.
QR code
zero login
smart cards
electronic tokens
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are the 3 main purpose of anti-malware software?
Detect-Copy-Redo
Filter-Prevent-Accept
Open-Write-Remove
Detect-Prevent-Remove
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Computer Education Grade 3 Volume 4 Quiz
Quiz
•
3rd Grade - University
10 questions
UH 1 DKK3 SMKTAQ
Quiz
•
10th Grade
10 questions
Latihan ICT Part 2
Quiz
•
10th Grade
11 questions
Packet Switching and Encryption
Quiz
•
10th - 12th Grade
12 questions
ICT Computer Basics pt1
Quiz
•
10th - 12th Grade
10 questions
INTERNET AND INTRANET
Quiz
•
9th - 11th Grade
15 questions
UH 1 BTIK
Quiz
•
10th Grade
13 questions
Раздел 5, информатика, 8 класс
Quiz
•
10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade