
DFS4143 CHAPTER 2 QUIZ
Authored by SITI SUKAIMI
Computers
1st - 3rd Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the technique used to search for weaknesses in order to apply a patch of fix a code of an application.
Threat identification
Vulnerability Assessment
Diversionary tactic
Threat assessment
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the type of attack that uses more than one computer to attack the victim.
Denial of Service (DOS) Attack
Malware Attack
Distributed Denial of Service (DOS) Attack
User Datagram Protocol (UDP) Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hardware and software system that contain design flaws that can be exploited
TRUE
FALSE
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Poor management in network refers to system that are incorrectly configured, and therefore vulnerable to attack
TRUE
FALSE
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This individual is involved in aggressive plays and creates trouble to computers. This individual doesn’t like to explore and gain knowledge from their activities. His purpose is to harm the computer.
Attacker
Hacker
Phisher
Spoofer
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attempt to gain access to information without authorization is called __________________.
Reconnaissance Attack
Malicious Code Attack
Denial of Service Attack
Access Attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the CORRECT threat for a program that take up storage space and memory in your computer which may slow it down.
Malware
Virus
Spam
Phising
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?