PRG2

PRG2

University

50 Qs

quiz-placeholder

Similar activities

RUTS Technology

RUTS Technology

9th Grade - Professional Development

50 Qs

MATCHA AUDIO 1

MATCHA AUDIO 1

University

50 Qs

EP RE 4b to 6b

EP RE 4b to 6b

University

46 Qs

TN 1_U1-10_Vocabulary

TN 1_U1-10_Vocabulary

University

50 Qs

IT Test 3

IT Test 3

University

50 Qs

DDI SEM 3 - BAHASA INGGERIS 1 (2020)

DDI SEM 3 - BAHASA INGGERIS 1 (2020)

University

50 Qs

Creative Writing Diagnostic Test

Creative Writing Diagnostic Test

12th Grade - University

50 Qs

PRG2

PRG2

Assessment

Quiz

English

University

Practice Problem

Easy

Created by

21070585 Anh

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user notices unwanted pop-ups and advertisements while browsing. Which type of malware is likely responsible?

Adware

Trojan

Spyware

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat involves a hacker intercepting and altering messages between two parties to manipulate the conversation?

Man-in-the-middle

Phishing

SQL Injection

Spear-phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storing passwords in plain text within a database is an example of a ___________

Misconfiguration vulnerability

Physical security vulnerability

Secure configuration

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends a large number of requests to a website, causing it to slow down and become inaccessible. This is an example of what attack?

DoS

Phishing

SQL Injection

Backdoor

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are common signs of a malware infection? (Choose two)

Slow system performance

Unexpected pop-up ads

Frequent updates

Short battery life

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company notices that an unknown user has been attempting to connect to their servers using brute-force methods. What type of threat is this?

Password attack

Insider threat

Malware

Zero-day exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rootkits are easy to detect with standard antivirus software

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?