Chapter 5 - Internet and its uses

Chapter 5 - Internet and its uses

9th - 12th Grade

83 Qs

quiz-placeholder

Similar activities

Operations Team Swiggy

Operations Team Swiggy

KG - Professional Development

85 Qs

2.2 Programming Alt

2.2 Programming Alt

10th Grade

87 Qs

OCR H446 - 1.4 Data Types and Structures - Computer Systems - 01

OCR H446 - 1.4 Data Types and Structures - Computer Systems - 01

12th Grade

78 Qs

Review Quiz - Comprog Grade 12 - October 24, 2023

Review Quiz - Comprog Grade 12 - October 24, 2023

12th Grade

80 Qs

TKJ_

TKJ_

1st - 10th Grade

80 Qs

TEST 30

TEST 30

10th Grade

80 Qs

tin học 81c

tin học 81c

10th Grade

79 Qs

Chapter 5 - Internet and its uses

Chapter 5 - Internet and its uses

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Asim Ali

Used 1+ times

FREE Resource

83 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of a brute-force attack?
A) To guess passwords by trying every possible combination
B) To intercept data being transmitted
C) To overload a system with requests
D) To infect a system with malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of a Distributed Denial of Service (DDoS) attack?
A) Involves only one attacker
B) Involves multiple computers flooding a target with traffic
C) Focuses on phishing attempts
D) Spreads spyware across a network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is defined as:
A) Unauthorized access to a computer system or network
B) Sending fraudulent emails to gain personal information
C) Redirecting users to a fake website
D) Injecting malicious software into systems

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware includes the following, EXCEPT:
A) Virus
B) Worm
C) Spyware
D) Pharming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware disguises itself as legitimate software to deceive users?
A) Virus
B) Worm
C) Trojan horse
D) Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing attacks are primarily designed to:
A) Damage files on a system
B) Deceive individuals into providing sensitive information
C) Overload a system with traffic
D) Spy on user activities through a hidden program

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social engineering refers to:
A) The manipulation of individuals into divulging confidential information
B) The development of secure networks
C) The use of encryption algorithms
D) The deployment of firewalls to block unauthorized access

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?