CH8 Security

CH8 Security

University

20 Qs

quiz-placeholder

Similar activities

MBS INT BUS S7 Digital Transformation and Emerging Technologies

MBS INT BUS S7 Digital Transformation and Emerging Technologies

University

20 Qs

e-commerce security FILL Quiz

e-commerce security FILL Quiz

University

15 Qs

BCS Network Security Quiz 5

BCS Network Security Quiz 5

University - Professional Development

17 Qs

Objectives

Objectives

12th Grade - University

20 Qs

QUIZ 1

QUIZ 1

University

20 Qs

Macro Environment and Digital Marketing Quiz

Macro Environment and Digital Marketing Quiz

University

20 Qs

E-Commerce-CIA-II(2022)

E-Commerce-CIA-II(2022)

University

20 Qs

Evaluasi Training Awareness ISO 27000 - Arash Digital

Evaluasi Training Awareness ISO 27000 - Arash Digital

University

20 Qs

CH8 Security

CH8 Security

Assessment

Quiz

Business

University

Easy

Created by

Wenshin Chen

Used 8+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

System security is to to prevent unauthorized access, alteration, theft, or physical damage to information systems

True

False

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The reasons that information systems are vulnerable do not include:

hardware problems

software problems

network avaliability

disasters

expensive equipment

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Internet vulnerabilities include all but:

open networks

email attachments

instant messaging

P2P communications

loss of devices

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Eavesdroppers driving by buildings and trying to detect SSID for intrusion purposes is called:

rouge access point

war driving

hacking

sniffer

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malicious software that can replicate itself is called:

sniffer

social malware

worms

viruses

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malware received through spams that can encrypt data files for blackmailing and payments is:

trojan horse

worms

injection attack

ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The type of malicious software that can monitor users' keystrokes and computing activities is:

trojan horse

spyware

worms

ransomware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?