Search Header Logo

Chapter 5 IIS Part 1

Authored by Norami Norami

Computers

University

Used 5+ times

Chapter 5 IIS Part 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best describes why you should NOT disclose personal confidential information on social networking sites?

The information may violate the terms and conditions of the website.

The information may be difficult to remove from your user page.

The information may be used by other users for identity theft.

The information may affect the graphical appearance of the website.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following helps ensure confidentiality when using instant messaging?

Enabling cookies in your browser.

Not revealing personal information.

Run adware while messaging.

Invite unknown users to chat.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best describes a known security vulnerability of instant messaging (IM)?

Messages can shut down the firewall.

Message text can be a virus in itself.

Messages can disable the power supply.

Message attachments can contain malware.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best describes phishing?

E-mail with large file attachments intended to slow down the e-mail server.

E-mail with the intent to trick the recipient into revealing financial details.

E-mail with malware that tries to use the recipient 's address book for fraudulent purposes.

E-mail with advertisements sent from fraudulent senders.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best describes the term pharming?

Using instant messaging to gather personal information.

Deliberately misdirecting users to a fraudulent website.

Sending unsolicited e-mail to a large number of users.


Collecting browser habit information via malware.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a potential danger when using social networking sites?

Encrypting.

Scanning.

Grooming.

Scrolling.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is an example of how a digital signature might be used?

To improve web search results.


To replace passwords.

To improve e-mail security.

To compress large files.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?