
Tech+ 6.0 Security
Authored by Jonathan Rilley
Computers
11th - 12th Grade
Used 248+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can copy itself and infect a computer without the user's consent or knowledge?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of self-replicating program copies itself to other computers on a network without any user intervention and consumes bandwidth and computer resources?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What technique is used to send you to a fake, but realistic-looking, website to verify your account information?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______ is software that is designed to infiltrate or affect a computer system without the owner's informed consent.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which two types of attacks are at least some what thwarted with the use of the account lockout policy?
Dictionary attack
Brute Force attack
Denial-of-Service attack
Buffer Overflow
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What provides secure access to a network over the Internet?
NAT
VPN
NIP
NAP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an authentication method that identifies individuals based on physical characteristics such as fingerprints, facial recognition, retina scans, or voice patterns?
RADIUS
Dictionary attack
Biometrics
Brute Force Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?