Tech+  6.0 Security

Tech+ 6.0 Security

11th - 12th Grade

26 Qs

quiz-placeholder

Similar activities

Six Weeks Test 5th Form

Six Weeks Test 5th Form

11th Grade

23 Qs

Tugas Kuis Bandwidth - 2

Tugas Kuis Bandwidth - 2

12th Grade

25 Qs

1.7 Systems Software

1.7 Systems Software

11th Grade

21 Qs

OCR L3 ICT - U1 Ethical & Operational Issues - Threats

OCR L3 ICT - U1 Ethical & Operational Issues - Threats

10th - 12th Grade

23 Qs

2.5 The Broadband Internet Connection

2.5 The Broadband Internet Connection

12th Grade

22 Qs

Computadora

Computadora

1st - 12th Grade

27 Qs

UC2: Planejar e executar a instalação de hardware e software

UC2: Planejar e executar a instalação de hardware e software

12th Grade

22 Qs

Computer Software

Computer Software

11th Grade

24 Qs

Tech+  6.0 Security

Tech+ 6.0 Security

Assessment

Quiz

Computers

11th - 12th Grade

Practice Problem

Medium

Created by

Jonathan Rilley

Used 247+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can copy itself and infect a computer without the user's consent or knowledge?

virus
Trojan horse
rootkit
backdoor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of self-replicating program copies itself to other computers on a network without any user intervention and consumes bandwidth and computer resources?

virus
Trojan horse
worm
backdoor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique is used to send you to a fake, but realistic-looking, website to verify your account information?

spoofing
smurfing
man-in-the-middle
phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______ is software that is designed to infiltrate or affect a computer system without the owner's informed consent.

backdoor
buffer overflow
malware
spyware

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two types of attacks are at least some what thwarted with the use of the account lockout policy?

Dictionary attack

Brute Force attack

Denial-of-Service attack

Buffer Overflow

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What provides secure access to a network over the Internet?

NAT

VPN

NIP

NAP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an authentication method that identifies individuals based on physical characteristics such as fingerprints, facial recognition, retina scans, or voice patterns?

RADIUS

Dictionary attack

Biometrics

Brute Force Attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?