Search Header Logo
Untitled Presentation

Untitled Presentation

Assessment

Presentation

Computers

University

Practice Problem

Hard

Created by

SHERLYN FACULTY

FREE Resource

30 Slides • 12 Questions

1

media

2

Multiple Choice

Which security principles are covered by the CIA triad?

1

certified, integrated, accessible

2

continuity, integrity, accessibility

3

confidentiality, integrity, availability

4

confidentiality, installation, assembly

3

media

4

Multiple Choice

A device used to connect to the Internet on most home computers.

1

(a) Peripheral

2

(b) Monitor

3

(c) Device

4

(d) Modem

5

media

6

media

7

media

8

media

9

media

10

Multiple Choice

What is the purpose of a VPN (Virtual Private Network) in terms of network security?

1

To increase the speed of your internet connection

2

To monitor all your online activities

3

To secure your internet connection by encrypting data

4

To display advertisements based on your browsing history

11

media

12

Multiple Choice

What is the full form of HTTPS?

1

Hypertext Transfer Protocol Secure

2

Hypertext Transmission Protocol Secure

3

Hyper Transfer Text Protocol Secure

4

Hypertext Transfer Protocol Standard

13

media

14

media

15

media

16

media

17

media

18

Multiple Choice

Question image

________ is a type of malware that is designed to secretly monitor a user's online activities, such as browsing history and keystrokes, and send this information back to a third party.

1

Virus

2

Worm

3

Spyware

4

Ransomware

19

media

20

media

21

media

22

media

23

media

24

Multiple Choice

Data is held hostage or threatened to be released by encrypting it through malware. To undo the encrcyption a ranson often needs to be paid

1

Ransomeware

2

IOT Attacks

3

Spyware

4

Phisphing

25

media

26

Multiple Choice

A program installed to collect information about users, their systems or browsing habits, keys that are typed, sending the data to a remote user.

1

IOT Attacks

2

Zero Day Exploit

3

Denial of Service

4

Spyware

27

media

28

Multiple Choice

What type of malware is designed to gather information from a computer without the user's knowledge?

1

Adware

2

Spyware

3

Ransomware

4

Virus

29

media

30

media

31

Multiple Choice

Question image

I look like a normal piece of software but secretly I will infect your system – What am i?

1

Trojan Horse

2

Virus

3

Phishing Email

4

Ransomware

32

media

33

media

34

Multiple Choice

What is the benefit of using antivirus software?

1

Blocks hackers from entering your computer

2

Blocks and removes most malware from your computer

3

Does not allow any malware onto your computer

4

Provides a firewall

35

media

36

Multiple Choice

Is the statement true?

1

True

2

False

3

Maybe

4

Not Sure

37

media

38

Multiple Choice

Which of these is the best definition of Phishing?

1

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

2

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

3

A cyber attack that redirects a user from a real URL to a website that looks real but is not.

4

Looking at someone entering their personal data into a system and copying what you see.

39

media

40

media

41

media

42

media
media

Show answer

Auto Play

Slide 1 / 42

SLIDE