CH8 Security

CH8 Security

University

20 Qs

quiz-placeholder

Similar activities

S6 FDLF SIFI 1

S6 FDLF SIFI 1

University

20 Qs

Macro Environment

Macro Environment

University

17 Qs

Unit 05 - Create and use databases

Unit 05 - Create and use databases

University

20 Qs

Sistem Informasi Manajemen

Sistem Informasi Manajemen

University

20 Qs

Repaso mod 1 Estrategia

Repaso mod 1 Estrategia

University

20 Qs

Soal UTS Pemasaran Strategik kelas B1

Soal UTS Pemasaran Strategik kelas B1

University

20 Qs

Quiz Robert Kiyosaki Yokoi Kenji EMPRENDIMIENTO

Quiz Robert Kiyosaki Yokoi Kenji EMPRENDIMIENTO

University

15 Qs

CHAPTER 7 Social, Mobile and Local Marketing

CHAPTER 7 Social, Mobile and Local Marketing

University

20 Qs

CH8 Security

CH8 Security

Assessment

Quiz

Business

University

Practice Problem

Easy

Created by

Wenshin Chen

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

System security is to to prevent unauthorized access, alteration, theft, or physical damage to information systems

True

False

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The reasons that information systems are vulnerable do not include:

hardware problems

software problems

network avaliability

disasters

expensive equipment

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Internet vulnerabilities include all but:

open networks

email attachments

instant messaging

P2P communications

loss of devices

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Eavesdroppers driving by buildings and trying to detect SSID for intrusion purposes is called:

rouge access point

war driving

hacking

sniffer

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malicious software that can replicate itself is called:

sniffer

social malware

worms

viruses

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malware received through spams that can encrypt data files for blackmailing and payments is:

trojan horse

worms

injection attack

ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The type of malicious software that can monitor users' keystrokes and computing activities is:

trojan horse

spyware

worms

ransomware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?