
Chapter 5 IIS Part 1

Quiz
•
Computers
•
University
•
Medium

Norami Norami
Used 5+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following best describes why you should NOT disclose personal confidential information on social networking sites?
The information may violate the terms and conditions of the website.
The information may be difficult to remove from your user page.
The information may be used by other users for identity theft.
The information may affect the graphical appearance of the website.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following helps ensure confidentiality when using instant messaging?
Enabling cookies in your browser.
Not revealing personal information.
Run adware while messaging.
Invite unknown users to chat.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following best describes a known security vulnerability of instant messaging (IM)?
Messages can shut down the firewall.
Message text can be a virus in itself.
Messages can disable the power supply.
Message attachments can contain malware.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following best describes phishing?
E-mail with large file attachments intended to slow down the e-mail server.
E-mail with the intent to trick the recipient into revealing financial details.
E-mail with malware that tries to use the recipient 's address book for fraudulent purposes.
E-mail with advertisements sent from fraudulent senders.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following best describes the term pharming?
Using instant messaging to gather personal information.
Deliberately misdirecting users to a fraudulent website.
Sending unsolicited e-mail to a large number of users.
Collecting browser habit information via malware.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is a potential danger when using social networking sites?
Encrypting.
Scanning.
Grooming.
Scrolling.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is an example of how a digital signature might be used?
To improve web search results.
To replace passwords.
To improve e-mail security.
To compress large files.
Create a free account and access millions of resources
Similar Resources on Wayground
8 questions
CIA Triad

Quiz
•
University
15 questions
Chapter 4 - Social Engineering

Quiz
•
University
10 questions
Unit2 Quiz

Quiz
•
University
10 questions
Cyperspace

Quiz
•
University
10 questions
Telecommunications & Networking

Quiz
•
9th Grade - University
10 questions
Web Page Design Review 2

Quiz
•
KG - University
10 questions
Information & Communication Technology (ICT)

Quiz
•
University
10 questions
Computer Networks Quiz

Quiz
•
University - Professi...
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University