DFS4143 CHAPTER 2 QUIZ

DFS4143 CHAPTER 2 QUIZ

1st - 3rd Grade

10 Qs

quiz-placeholder

Similar activities

Module 3

Module 3

3rd Grade

15 Qs

Computer Networks

Computer Networks

3rd - 4th Grade

14 Qs

Data Communication

Data Communication

3rd Grade

15 Qs

Cyber Security Quiz

Cyber Security Quiz

1st - 5th Grade

10 Qs

BTEC DIT: Revision 1-6

BTEC DIT: Revision 1-6

1st - 12th Grade

11 Qs

Communication & Networking - Topologies

Communication & Networking - Topologies

3rd - 12th Grade

11 Qs

COMPUTING Parts of a Computer

COMPUTING Parts of a Computer

2nd - 7th Grade

11 Qs

Hackers and Viruses

Hackers and Viruses

1st Grade

10 Qs

DFS4143 CHAPTER 2 QUIZ

DFS4143 CHAPTER 2 QUIZ

Assessment

Quiz

Computers

1st - 3rd Grade

Hard

Created by

SITI SUKAIMI

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the technique used to search for weaknesses in order to apply a patch of fix a code of an application.

Threat identification

Vulnerability Assessment

Diversionary tactic

Threat assessment

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the type of attack that uses more than one computer to attack the victim.

Denial of Service (DOS) Attack

Malware Attack

Distributed Denial of Service (DOS) Attack

User Datagram Protocol (UDP) Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hardware and software system that contain design flaws that can be exploited

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Poor management in network refers to system that are incorrectly configured, and therefore vulnerable to attack

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This individual is involved in aggressive plays and creates trouble to computers. This individual doesn’t like to explore and gain knowledge from their activities. His purpose is to harm the computer.

Attacker

Hacker

Phisher

Spoofer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attempt to gain access to information without authorization is called __________________.

Reconnaissance Attack

Malicious Code Attack

Denial of Service Attack

Access Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the CORRECT threat for a program that take up storage space and memory in your computer which may slow it down.

Malware

Virus

Spam

Phising

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?