
QUIZ CHAP 5 CAD1013
Authored by KASMAWAHIDA WAHAB
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
security
liability
terrorism
network
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A(n) ____ is someone who uses the Internet or network to destroy or damage computers for political reasons
hacker
script kiddie
cyberextortionist
cyberterrorist
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Computer viruses, worms, Trojan horses, and rootkits are classified as ____, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations.
malware
untrusted sources
threats
cybermals
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
rebuking
spoofing
transmitting
victimizing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Digital forensics is used by ____.
military intelligence
insurance agencies
law enforcement
all of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To ____ a file means to make a copy of it.
restore
back up
concatenate
decipher
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Ergonomics
Eurhythmics
Epidemics
Econometrics
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?