Search Header Logo

ITGS Chapter 5 Security

Authored by Alexandra Jados

Computers

10th - 11th Grade

Used 6+ times

ITGS Chapter 5 Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of fingerprints, retina scans, or other body features as an authentication mechanism.

Bonet

Biometrics

Backdoor

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Flooding a computer system with data so that it cannot respond to genuine users.

Bonet

Biometrics

Denial of Service

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

System of encoding plain text so that it cannot be understood with access to an encryption key.

Bonet

Biometrics

Denial of Service

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.

Pharming

Biometrics

Denial of Service

Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unwanted, bulk email.

Pharming

Smishing

Spam

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware which pretends to be a genuinely useful program to trick the user into using it.

Trojan Horse

Smishing

Spam

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Technique used by spammers to detect if an email address is valid or not.

Trojan Horse

Smishing

Web Bug

Encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?