Chapter 7

Chapter 7

Professional Development

20 Qs

quiz-placeholder

Similar activities

Encryption

Encryption

Professional Development

15 Qs

Quiz TLJ Kelas XII TKJ  (Tugas Diklat 7 Samisanov)

Quiz TLJ Kelas XII TKJ (Tugas Diklat 7 Samisanov)

Professional Development

15 Qs

Ports

Ports

Professional Development

20 Qs

Network MG

Network MG

Professional Development

20 Qs

IP Fundamentals Day 1 - TTI Cadetship

IP Fundamentals Day 1 - TTI Cadetship

Professional Development

15 Qs

DDC_Finals Quiz

DDC_Finals Quiz

Professional Development

25 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

ICT30120 Certificate III in Information Technology

ICT30120 Certificate III in Information Technology

Professional Development

22 Qs

Chapter 7

Chapter 7

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Peter McDaid

Used 10+ times

FREE Resource

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Gaining unauthorized access to a computer with the intention of corrupting or stealing data is called?

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending 'junk' emails, e.g. adverts for products; as a result, the inbox becomes overloaded and time is wasted opening and reading such emails. This is called?

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending emails that appear to be from a reliable source; these emails often ask the recipient to update their personal information by clicking a hyperlink that opens a web page - this information is then used by hackers for the purpose of identity theft. What is this called?

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that is unintentionally downloaded onto a computer by a user is called?

Hacking

Spyware

Malware

Phishing

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Using a computer to intentionally commit a crime, e.g. stealing data or money is called __________ crime?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware can enter the network through browsing the internet, opening email attachment, via a USB storage device, etc

Key Logger

Trojan Horse

Work

Virus

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

This malware spreads around a computer system by replicating itself.

Trojan Horse

Worm

Spyware

Key Logger

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?