Topic 3 MIS Information Systems Security

Topic 3 MIS Information Systems Security

University

20 Qs

quiz-placeholder

Similar activities

Quiz #1 - Computing Disciplines

Quiz #1 - Computing Disciplines

University

15 Qs

Input Output Devices

Input Output Devices

University

15 Qs

Module 2- Cyber Forensics

Module 2- Cyber Forensics

12th Grade - University

16 Qs

ITB Quiz 1

ITB Quiz 1

University

20 Qs

230419_quizizz

230419_quizizz

University

15 Qs

techveorp_ict

techveorp_ict

University

15 Qs

Pengenalan Microsoft - ARS - Politeknik Nusantara Balikpapan

Pengenalan Microsoft - ARS - Politeknik Nusantara Balikpapan

University

20 Qs

Basic Information Security

Basic Information Security

University

24 Qs

Topic 3 MIS Information Systems Security

Topic 3 MIS Information Systems Security

Assessment

Quiz

Other

University

Medium

Created by

SHAHZAN (POLIKK)

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement

hacking

virus attack

data theft

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You can protect yourself against spam or fraudulent emails by:

using a spam filter

never clicking on links that you are suspicious of

being aware of different types of fraudulent email

all of the above

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A computer virus may:

overwrite your files and corrupt your data

steal important information from your computer

use a lot of memory and slow down your computer

all of the above

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

To avoid your computer being infected by malware, you should not:

download music or software from illegal sites

open emails from people you have never met

open any and all email attachments

post personal details on social networking sites

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When choosing a password you should:

use something easy to remember like your pet’s name

use a combination of letters and numbers that mean something to you but no one else

save all your passwords in a file on your computer in case you forget one

use a foreign word that will not be in an English dictionary

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the term used for a program that attaches to a computer program to spread to other computers?

Backdoor program

Keylogger

Packet analyzer

Trojan horse

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary goal of identity theft?

Enhancing social media profiles

Stealing personal information and posing as the victim

Providing financial assistance to individuals

Improving credit scores

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?