икт 8

икт 8

University

25 Qs

quiz-placeholder

Similar activities

CSA51 TFF TEST 1

CSA51 TFF TEST 1

University

25 Qs

IT Essential Chapter 6 Windows Configurations & Management

IT Essential Chapter 6 Windows Configurations & Management

University

20 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

Network Defence

Network Defence

University

20 Qs

IAS CH3 QUIZ

IAS CH3 QUIZ

University

25 Qs

Python Text Files

Python Text Files

University

20 Qs

Computer Security 1

Computer Security 1

University

30 Qs

Week 15 - Module 5 Unit 2 Using Best Practice

Week 15 - Module 5 Unit 2 Using Best Practice

University

20 Qs

икт 8

икт 8

Assessment

Quiz

Computers

University

Hard

Created by

Dias Serdembaev

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The conversion process in which the source text is replaced with ciphertext is…

encryption

decryption

decoding

coding

authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the basis of the anti-virus program?

Waiting for the start of a virus attack.

Backup of all files .

Constant check of removable data carriers.

Deleting the infected files .

Comparison of program codes with codes of known viruses.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Polymorphic Virus  …

changes the contents of files and disk sectors.

substitutes instead of itself the non-infected sections of information.

encrypts and changes their coding so they are harder to detect.

can be quite easily detected and destroyed

it is activated when a certain trigger condition occurs.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The word  is encoded  using a substitution method and  looks  like  “946150556175”.

ONLINE

SECRET

CRYPTO

CIPHER

HACKER


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer virus?*

A program that can self-replicate and attach itself to various objects or resources of computer systems, networks without user knowledge.

A program that contains promotional information and opens without user request.

A program that runs itself when you turn on your computer.

A code that prevents external devices from connecting to your computer.

A special microchip, which determines the correct operation of the computer.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A method of protecting information based to transform messages in ways that are hard to decipher.

Cryptography

Cryptology

Cryptanalysis

Authorization

Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The cipher where some pseudo-random sequence generated from the key is superimposed on the source text.  

transposition

open

gamming

block

substitution

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?