ITGS Chapter 5 Security

ITGS Chapter 5 Security

10th - 11th Grade

12 Qs

quiz-placeholder

Similar activities

IGCSE ICT - Safety and Security

IGCSE ICT - Safety and Security

10th - 12th Grade

7 Qs

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

Ethical and Social Issues in ICT

Ethical and Social Issues in ICT

10th Grade

15 Qs

Internet

Internet

5th - 12th Grade

11 Qs

Prepare For Final Exam

Prepare For Final Exam

9th - 12th Grade

16 Qs

Bảo mật mạng

Bảo mật mạng

11th Grade

10 Qs

IBA Chapter 8B

IBA Chapter 8B

8th - 12th Grade

16 Qs

ITGS Chapter 5 Security

ITGS Chapter 5 Security

Assessment

Quiz

Computers

10th - 11th Grade

Easy

Created by

Alexandra Jados

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of fingerprints, retina scans, or other body features as an authentication mechanism.

Bonet

Biometrics

Backdoor

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Flooding a computer system with data so that it cannot respond to genuine users.

Bonet

Biometrics

Denial of Service

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

System of encoding plain text so that it cannot be understood with access to an encryption key.

Bonet

Biometrics

Denial of Service

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.

Pharming

Biometrics

Denial of Service

Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unwanted, bulk email.

Pharming

Smishing

Spam

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware which pretends to be a genuinely useful program to trick the user into using it.

Trojan Horse

Smishing

Spam

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Technique used by spammers to detect if an email address is valid or not.

Trojan Horse

Smishing

Web Bug

Encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers