Chapter 5 IIS Part 1

Chapter 5 IIS Part 1

University

10 Qs

quiz-placeholder

Similar activities

Компьютерные сети

Компьютерные сети

University

10 Qs

IOT_Quiz

IOT_Quiz

University

10 Qs

Computer Fundamentals

Computer Fundamentals

University

10 Qs

Web Development Revision 1

Web Development Revision 1

University

15 Qs

Week 1 Quiz - SHEstem IoT cohort by MSC BV (31/5/24)

Week 1 Quiz - SHEstem IoT cohort by MSC BV (31/5/24)

University

10 Qs

LLB10403 Quiz 5 Chapter 6

LLB10403 Quiz 5 Chapter 6

University

15 Qs

Chapter 9

Chapter 9

University

9 Qs

Intro Computer

Intro Computer

University

10 Qs

Chapter 5 IIS Part 1

Chapter 5 IIS Part 1

Assessment

Quiz

Computers

University

Medium

Created by

Norami Norami

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best describes why you should NOT disclose personal confidential information on social networking sites?

The information may violate the terms and conditions of the website.

The information may be difficult to remove from your user page.

The information may be used by other users for identity theft.

The information may affect the graphical appearance of the website.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following helps ensure confidentiality when using instant messaging?

Enabling cookies in your browser.

Not revealing personal information.

Run adware while messaging.

Invite unknown users to chat.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best describes a known security vulnerability of instant messaging (IM)?

Messages can shut down the firewall.

Message text can be a virus in itself.

Messages can disable the power supply.

Message attachments can contain malware.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best describes phishing?

E-mail with large file attachments intended to slow down the e-mail server.

E-mail with the intent to trick the recipient into revealing financial details.

E-mail with malware that tries to use the recipient 's address book for fraudulent purposes.

E-mail with advertisements sent from fraudulent senders.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best describes the term pharming?

Using instant messaging to gather personal information.

Deliberately misdirecting users to a fraudulent website.

Sending unsolicited e-mail to a large number of users.


Collecting browser habit information via malware.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a potential danger when using social networking sites?

Encrypting.

Scanning.

Grooming.

Scrolling.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is an example of how a digital signature might be used?

To improve web search results.


To replace passwords.

To improve e-mail security.

To compress large files.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?