
Tutorial 8 Security
Authored by TechMan TechMan
Education, Instructional Technology, Other
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
1. What is another name for junk e-mails?
Archive
Spam
Inbox
Outbox
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
2. True or False: The speed of computers can intensify mistakes.
True
False
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
3. The first step to prevent computer-related waste is to establish ____________________ and ____________________ regarding efficient acquisition, use, and disposal of systems and devices.
policies, procedures
organisations, procedures
policies, regulations
operations, rules
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
4. True or False: One common policy for minimizing waste and mistakes is that each system report should indicate its general content in its title and specify the time it covers.
True
False
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
5. Many organizations implement internal ____________________ to measure actual results against established goals.
Accounting
Human Resources
Audits
Insourcing
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
6. __________________ is the practice of using one’s social skills to get computer users to provide information to access an information system.
Hacking
Shoulder Surfing
Phishing
Social engineering
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
7. ____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
Social Engineering
Identity theft
Malware
Phishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?