
Unit 12 - Data Security
Authored by Tuyet Pham
Science
University
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a computer crime against property?
Hacking into a social media account to post inappropriate content
Unauthorized access to a computer system to steal sensitive information
Using a computer to create counterfeit money
Downloading a movie from a torrent website
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used for the act of using email to deceive individuals into providing sensitive information?
spamming
fishing
phishing
scamming
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
______________ involves flooding an email address with thousands of messages, often crashing the recipient's server.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
By creating a program that looks legitimate but performs destructive activities in the background, a ______________ can cause significant damage to a system.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Hackers often use ______________ to trick unsuspecting users into revealing sensitive information, such as passwords or credit card numbers.
6.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
In a denial of service attack, a hacker swamps a server with a massive number of ________________, making it inaccessible to legitimate users.
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
______________ refers to unauthorized copying and distribution of software for sale or sharing with others.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?