POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

7th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Tes Sumatif Kelas X.10-X.12

Tes Sumatif Kelas X.10-X.12

10th Grade

20 Qs

VPN

VPN

12th Grade

15 Qs

IP ADDRESSING AND ITS VERSION

IP ADDRESSING AND ITS VERSION

11th Grade

15 Qs

Unit #10 | Worksheet #2

Unit #10 | Worksheet #2

8th Grade

20 Qs

LAN, MAN, WAN Network

LAN, MAN, WAN Network

12th Grade - University

18 Qs

Database

Database

2nd Grade - University

15 Qs

UH Informatika Kelas 7

UH Informatika Kelas 7

10th Grade

20 Qs

IBA Chapter 1 Vocabulary Part 1

IBA Chapter 1 Vocabulary Part 1

7th - 8th Grade

15 Qs

POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

Assessment

Quiz

Computers

7th - 12th Grade

Practice Problem

Hard

Created by

Renee Bajor

Used 33+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A guessed password affects which basic principle of a company's security?

Confidentiality

Safety

Availability

Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Windows 7 machine used by the receptionist did not get the latest security patches, and a known vulnerability was exploited. Which business security domain should have addressed this issue?

LAN

Workstation

Server

WAN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following presents a threat to the network>

An unpatched computer.

A computer infected with a root kit.

The sales manager's use of a weak password.

Files are not protected with a password.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The data on a server is encrypted from a ______________ threat. This affects the ________________ principle.

ransomware; confidentiality

worm; availability

ransomware; availability

root kit; integrity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of malware spreads through an open network port.

Trojan horse

Worm

Root kit

Polymorphic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which situation leaves you most vulnerable to malware infections?

Installing purchased software from a DVD.

Surfing the Internet on mobile devices.

Exchanging messages through a social media app.

Using a flash drive on multiple machines.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bug-bounty programs are especially useful against which of the following?

Ransomware attacks

Zero-day vulnerabilities

Keyloggers

Malicious cookies

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?