Chapter 7

Chapter 7

Professional Development

20 Qs

quiz-placeholder

Similar activities

 Network Security Fundamentals

Network Security Fundamentals

Professional Development

20 Qs

CS8591-COMPUTER NETWORKS-UNIT-1

CS8591-COMPUTER NETWORKS-UNIT-1

Professional Development

20 Qs

Network Plus Pre Assessment

Network Plus Pre Assessment

Professional Development

15 Qs

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

8th Grade - Professional Development

21 Qs

ITF - Quiz 9.2 - TCP/IP

ITF - Quiz 9.2 - TCP/IP

Professional Development

15 Qs

Block 5 - 2D - Network Protocols

Block 5 - 2D - Network Protocols

Professional Development

17 Qs

KUIS ASJ KELAS XI

KUIS ASJ KELAS XI

11th Grade - Professional Development

15 Qs

Web Technology - Web Essentials

Web Technology - Web Essentials

Professional Development

15 Qs

Chapter 7

Chapter 7

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Peter McDaid

Used 10+ times

FREE Resource

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Gaining unauthorized access to a computer with the intention of corrupting or stealing data is called?

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending 'junk' emails, e.g. adverts for products; as a result, the inbox becomes overloaded and time is wasted opening and reading such emails. This is called?

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending emails that appear to be from a reliable source; these emails often ask the recipient to update their personal information by clicking a hyperlink that opens a web page - this information is then used by hackers for the purpose of identity theft. What is this called?

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that is unintentionally downloaded onto a computer by a user is called?

Hacking

Spyware

Malware

Phishing

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Using a computer to intentionally commit a crime, e.g. stealing data or money is called __________ crime?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware can enter the network through browsing the internet, opening email attachment, via a USB storage device, etc

Key Logger

Trojan Horse

Work

Virus

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

This malware spreads around a computer system by replicating itself.

Trojan Horse

Worm

Spyware

Key Logger

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?