Search Header Logo

CHAPTER 1

Authored by Afzanizam Alias

Computers

1st - 5th Grade

Used 2+ times

CHAPTER 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Utilizes system or application weaknesses and fasters spreading. It refers to...

HACKING

TROJAN

VIRUS

WORM

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______________ ensures that data has not been changed during transmission.

Availability

Confidentiality

Integrity

Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NetScan is one of describing access to data and equipment

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Network Security

Physical Security

Database Security

Information Security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing, Pretexting, Vishing is social engineering.

Tue

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware or rootkits.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

From the options below, which of them is not source of security treats?

Internal Treats

Unstructured Treats

Structured Treats

External Structured Treats

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers