XÓA

XÓA

University

50 Qs

quiz-placeholder

Similar activities

TracnghiemTACN

TracnghiemTACN

University

52 Qs

PASSAGES 1 - REVIEW (UNIT 1-6)

PASSAGES 1 - REVIEW (UNIT 1-6)

University

50 Qs

System Integration Quiz

System Integration Quiz

University

55 Qs

Cau51-100

Cau51-100

University

48 Qs

Test na zaliczenie j. angielskiego, semestr zimowy 2020/2021

Test na zaliczenie j. angielskiego, semestr zimowy 2020/2021

10th Grade - University

50 Qs

Teen Success 3-4

Teen Success 3-4

9th Grade - Professional Development

45 Qs

Leap 3_U7_LS2-3

Leap 3_U7_LS2-3

University

50 Qs

Unit 3,4,5

Unit 3,4,5

University

50 Qs

XÓA

XÓA

Assessment

Quiz

English

University

Hard

Created by

21070585 Anh

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user notices unwanted pop-ups and advertisements while browsing. Which type of malware is likely responsible?

Adware

Trojan

Spyware

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat involves a hacker intercepting and altering messages between two parties to manipulate the conversation?

Man-in-the-middle

Phishing

SQL Injection

Spear-phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storing passwords in plain text within a database is an example of a ___________

Misconfiguration vulnerability

Physical security vulnerability

Secure configuration

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends a large number of requests to a website, causing it to slow down and become inaccessible. This is an example of what attack?

DoS

Phishing

SQL Injection

Backdoor

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are common signs of a malware infection? (Choose two)

Slow system performance

Unexpected pop-up ads

Frequent updates

Short battery life

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company notices that an unknown user has been attempting to connect to their servers using brute-force methods. What type of threat is this?

Password attack

Insider threat

Malware

Zero-day exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rootkits are easy to detect with standard antivirus software

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?