PRG2

PRG2

University

50 Qs

quiz-placeholder

Similar activities

PRG3

PRG3

University

50 Qs

Revision Cyber Security

Revision Cyber Security

University

47 Qs

Midterm Exam in IT Elective 3

Midterm Exam in IT Elective 3

University

50 Qs

TracnghiemTACN

TracnghiemTACN

University

52 Qs

PASSAGES 1 - REVIEW (UNIT 1-6)

PASSAGES 1 - REVIEW (UNIT 1-6)

University

50 Qs

System Integration Quiz

System Integration Quiz

University

55 Qs

Career Planning and Development Concepts

Career Planning and Development Concepts

9th Grade - University

49 Qs

Test na zaliczenie j. angielskiego, semestr zimowy 2020/2021

Test na zaliczenie j. angielskiego, semestr zimowy 2020/2021

10th Grade - University

50 Qs

PRG2

PRG2

Assessment

Quiz

English

University

Easy

Created by

21070585 Anh

Used 10+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user notices unwanted pop-ups and advertisements while browsing. Which type of malware is likely responsible?

Adware

Trojan

Spyware

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat involves a hacker intercepting and altering messages between two parties to manipulate the conversation?

Man-in-the-middle

Phishing

SQL Injection

Spear-phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storing passwords in plain text within a database is an example of a ___________

Misconfiguration vulnerability

Physical security vulnerability

Secure configuration

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends a large number of requests to a website, causing it to slow down and become inaccessible. This is an example of what attack?

DoS

Phishing

SQL Injection

Backdoor

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are common signs of a malware infection? (Choose two)

Slow system performance

Unexpected pop-up ads

Frequent updates

Short battery life

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company notices that an unknown user has been attempting to connect to their servers using brute-force methods. What type of threat is this?

Password attack

Insider threat

Malware

Zero-day exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rootkits are easy to detect with standard antivirus software

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?