
ITGS 3.05: Security
Other
9th - 12th Grade
Used 58+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Use of fingerprints, retina scans, or other body features as an authentication mechanism.
Bonet
Biometrics
Backdoor
Malware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Flooding a computer system with data so that it cannot respond to genuine users.
Bonet
Biometrics
Denial of Service
Malware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
System of encoding plain text so that it cannot be understood with access to an encryption key.
Bonet
Biometrics
Denial of Service
Encryption
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.
Pharming
Biometrics
Denial of Service
Encryption
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing attacks committed using text messages (SMS).
Pharming
Smishing
Denial of Service
Encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Unwanted, bulk email.
Pharming
Smishing
Spam
Encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware which pretends to be a genuinely useful program to trick the user into using it.
Trojan Horse
Smishing
Spam
Encryption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?