DFS4143 CHAPTER 2 QUIZ

DFS4143 CHAPTER 2 QUIZ

1st - 3rd Grade

10 Qs

quiz-placeholder

Similar activities

REVISION PA-IV

REVISION PA-IV

3rd Grade

15 Qs

Examen Excel

Examen Excel

1st - 3rd Grade

10 Qs

Word

Word

3rd - 7th Grade

15 Qs

VPN

VPN

1st - 5th Grade

10 Qs

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

2nd - 10th Grade

10 Qs

Javascript 2

Javascript 2

1st Grade

13 Qs

Pascal pro

Pascal pro

1st Grade

10 Qs

Prueba Objetiva, Segundo grado. Escribe el nombre completo

Prueba Objetiva, Segundo grado. Escribe el nombre completo

2nd Grade

15 Qs

DFS4143 CHAPTER 2 QUIZ

DFS4143 CHAPTER 2 QUIZ

Assessment

Quiz

Computers

1st - 3rd Grade

Practice Problem

Hard

Created by

SITI SUKAIMI

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the technique used to search for weaknesses in order to apply a patch of fix a code of an application.

Threat identification

Vulnerability Assessment

Diversionary tactic

Threat assessment

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the type of attack that uses more than one computer to attack the victim.

Denial of Service (DOS) Attack

Malware Attack

Distributed Denial of Service (DOS) Attack

User Datagram Protocol (UDP) Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hardware and software system that contain design flaws that can be exploited

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Poor management in network refers to system that are incorrectly configured, and therefore vulnerable to attack

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This individual is involved in aggressive plays and creates trouble to computers. This individual doesn’t like to explore and gain knowledge from their activities. His purpose is to harm the computer.

Attacker

Hacker

Phisher

Spoofer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attempt to gain access to information without authorization is called __________________.

Reconnaissance Attack

Malicious Code Attack

Denial of Service Attack

Access Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the CORRECT threat for a program that take up storage space and memory in your computer which may slow it down.

Malware

Virus

Spam

Phising

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers