ITGS Chapter 5 Security

ITGS Chapter 5 Security

10th - 11th Grade

12 Qs

quiz-placeholder

Similar activities

Digital Communication II

Digital Communication II

5th Grade - University

15 Qs

A+ Chapter 8

A+ Chapter 8

11th Grade

13 Qs

OSI model

OSI model

11th - 12th Grade

12 Qs

Fraud

Fraud

KG - Professional Development

13 Qs

9I - Hackers and Malware

9I - Hackers and Malware

9th - 10th Grade

11 Qs

Quiz Sistem Keamanan Jaringan

Quiz Sistem Keamanan Jaringan

11th Grade

10 Qs

Attacchi informatici

Attacchi informatici

9th - 12th Grade

10 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

ITGS Chapter 5 Security

ITGS Chapter 5 Security

Assessment

Quiz

Computers

10th - 11th Grade

Easy

Created by

Alexandra Jados

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of fingerprints, retina scans, or other body features as an authentication mechanism.

Bonet

Biometrics

Backdoor

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Flooding a computer system with data so that it cannot respond to genuine users.

Bonet

Biometrics

Denial of Service

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

System of encoding plain text so that it cannot be understood with access to an encryption key.

Bonet

Biometrics

Denial of Service

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.

Pharming

Biometrics

Denial of Service

Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unwanted, bulk email.

Pharming

Smishing

Spam

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware which pretends to be a genuinely useful program to trick the user into using it.

Trojan Horse

Smishing

Spam

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Technique used by spammers to detect if an email address is valid or not.

Trojan Horse

Smishing

Web Bug

Encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers