PRG2

PRG2

University

50 Qs

quiz-placeholder

Similar activities

FEN21_R04_Vocab

FEN21_R04_Vocab

University

45 Qs

econ review

econ review

University

48 Qs

vocab 3

vocab 3

University

50 Qs

BAHASA INGGRIS 12

BAHASA INGGRIS 12

12th Grade - University

50 Qs

EXAM TRAINER TEST 3

EXAM TRAINER TEST 3

University

54 Qs

management 2

management 2

University

49 Qs

C1 Advanced Reading and Use of English Part 3 Workshop

C1 Advanced Reading and Use of English Part 3 Workshop

University

45 Qs

AKT test (351-400)   Ескі вариант

AKT test (351-400) Ескі вариант

University

50 Qs

PRG2

PRG2

Assessment

Quiz

English

University

Easy

Created by

21070585 Anh

Used 10+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user notices unwanted pop-ups and advertisements while browsing. Which type of malware is likely responsible?

Adware

Trojan

Spyware

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat involves a hacker intercepting and altering messages between two parties to manipulate the conversation?

Man-in-the-middle

Phishing

SQL Injection

Spear-phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storing passwords in plain text within a database is an example of a ___________

Misconfiguration vulnerability

Physical security vulnerability

Secure configuration

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends a large number of requests to a website, causing it to slow down and become inaccessible. This is an example of what attack?

DoS

Phishing

SQL Injection

Backdoor

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are common signs of a malware infection? (Choose two)

Slow system performance

Unexpected pop-up ads

Frequent updates

Short battery life

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company notices that an unknown user has been attempting to connect to their servers using brute-force methods. What type of threat is this?

Password attack

Insider threat

Malware

Zero-day exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rootkits are easy to detect with standard antivirus software

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?