FDM QUIZ FINAL

FDM QUIZ FINAL

12th Grade

25 Qs

quiz-placeholder

Similar activities

HPHY_Unit 5.2 Checkpoint

HPHY_Unit 5.2 Checkpoint

9th - 12th Grade

23 Qs

computer and technology quiz

computer and technology quiz

7th - 12th Grade

20 Qs

BAEL - Digital Security Quiz

BAEL - Digital Security Quiz

12th Grade

20 Qs

Digital Security Quiz

Digital Security Quiz

12th Grade - University

30 Qs

I2C UART CAN bus

I2C UART CAN bus

University

25 Qs

Kuis Teknologi Digital

Kuis Teknologi Digital

12th Grade

20 Qs

Easy Questions

Easy Questions

7th - 12th Grade

20 Qs

Circuitron

Circuitron

University

20 Qs

FDM QUIZ FINAL

FDM QUIZ FINAL

Assessment

Quiz

Physics

12th Grade

Easy

Created by

Rey Esperida

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a network attack?

Authorized actions on digital assets

Unauthorized actions on digital assets within an organizational network

Legal modifications to network systems

Routine maintenance of network perimeters

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passive network attacks involve:

Modifying or encrypting data

Stealing data without making alterations

Destroying network hardware

Sending spam emails

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Active network attacks may include:

Monitoring network traffic silently

Encrypting or damaging data

Only observing user behavior

Installing harmless adware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware is:

Software designed to improve system performance

Software designed to damage target systems

A type of firewall

A hardware component

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keyloggers are primarily used to:

Improve typing speed

Steal login credentials and personal information

Encrypt files

Block network traffic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trojans are named after:

A type of virus

The 'Trojan Horse' from ancient Greek history

A famous hacker

A programming language

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ransomware typically demands:

A thank-you note

Payment in standard or cryptocurrency

User feedback

System reboots

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?