
Chapter 5 IIS Part 1
Authored by Norami Norami
Computers
University
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following best describes why you should NOT disclose personal confidential information on social networking sites?
The information may violate the terms and conditions of the website.
The information may be difficult to remove from your user page.
The information may be used by other users for identity theft.
The information may affect the graphical appearance of the website.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following helps ensure confidentiality when using instant messaging?
Enabling cookies in your browser.
Not revealing personal information.
Run adware while messaging.
Invite unknown users to chat.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following best describes a known security vulnerability of instant messaging (IM)?
Messages can shut down the firewall.
Message text can be a virus in itself.
Messages can disable the power supply.
Message attachments can contain malware.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following best describes phishing?
E-mail with large file attachments intended to slow down the e-mail server.
E-mail with the intent to trick the recipient into revealing financial details.
E-mail with malware that tries to use the recipient 's address book for fraudulent purposes.
E-mail with advertisements sent from fraudulent senders.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following best describes the term pharming?
Using instant messaging to gather personal information.
Deliberately misdirecting users to a fraudulent website.
Sending unsolicited e-mail to a large number of users.
Collecting browser habit information via malware.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is a potential danger when using social networking sites?
Encrypting.
Scanning.
Grooming.
Scrolling.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is an example of how a digital signature might be used?
To improve web search results.
To replace passwords.
To improve e-mail security.
To compress large files.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?