Chapter 7

Chapter 7

Professional Development

20 Qs

quiz-placeholder

Similar activities

Cyber Resilience Training

Cyber Resilience Training

Professional Development

16 Qs

Core Protocols(TCP-DHCP-ARP)

Core Protocols(TCP-DHCP-ARP)

Professional Development

21 Qs

Internet 101

Internet 101

Professional Development

20 Qs

ITF - Quiz 9.2 - TCP/IP

ITF - Quiz 9.2 - TCP/IP

Professional Development

15 Qs

Telco Practice Test 1

Telco Practice Test 1

Professional Development

15 Qs

KUIS ASJ KELAS XI

KUIS ASJ KELAS XI

11th Grade - Professional Development

15 Qs

Web Technology - Web Essentials

Web Technology - Web Essentials

Professional Development

15 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Chapter 7

Chapter 7

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Peter McDaid

Used 10+ times

FREE Resource

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Gaining unauthorized access to a computer with the intention of corrupting or stealing data is called?

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending 'junk' emails, e.g. adverts for products; as a result, the inbox becomes overloaded and time is wasted opening and reading such emails. This is called?

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending emails that appear to be from a reliable source; these emails often ask the recipient to update their personal information by clicking a hyperlink that opens a web page - this information is then used by hackers for the purpose of identity theft. What is this called?

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that is unintentionally downloaded onto a computer by a user is called?

Hacking

Spyware

Malware

Phishing

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Using a computer to intentionally commit a crime, e.g. stealing data or money is called __________ crime?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware can enter the network through browsing the internet, opening email attachment, via a USB storage device, etc

Key Logger

Trojan Horse

Work

Virus

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

This malware spreads around a computer system by replicating itself.

Trojan Horse

Worm

Spyware

Key Logger

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?