Search Header Logo

Web engineering #1

Authored by Achin Jain

Computers

University

Used 6+ times

Web engineering #1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which of the following are consider physical security risks?

Hardware theft
password cracking
phishing
cooking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is the name of an application that appears to look like a helpful application but instead does harm to your computer?

virus
worm
malware
Trojan horse

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

David just heard of a program that if installed on your computer gives the attacker administrator-like access to your machine. what type of software is he talking about?

trojan horse
spyware
ransomeware
rootkit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are activities that a hacker might attempt?

Stealing usernames and passwords
Modifying website content
Disrupting network communications
All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what type of malware is best known for carrying other malware as a payload?

virus
Worm
trojan horse
rootkit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of software is used to circumvent normal security processes on a computer?

Backdoor
Trojan horse
spyware
phage virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person who uses computers to gain unauthorized access to other people's or organization's information.

administrator

user

hacker

developer

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?