
Web engineering #1
Authored by Achin Jain
Computers
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which of the following are consider physical security risks?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what is the name of an application that appears to look like a helpful application but instead does harm to your computer?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
David just heard of a program that if installed on your computer gives the attacker administrator-like access to your machine. what type of software is he talking about?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are activities that a hacker might attempt?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what type of malware is best known for carrying other malware as a payload?
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of software is used to circumvent normal security processes on a computer?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A person who uses computers to gain unauthorized access to other people's or organization's information.
administrator
user
hacker
developer
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?