
CHAPTER 1
Authored by Afzanizam Alias
Computers
1st - 5th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Utilizes system or application weaknesses and fasters spreading. It refers to...
HACKING
TROJAN
VIRUS
WORM
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______________ ensures that data has not been changed during transmission.
Availability
Confidentiality
Integrity
Authentication
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NetScan is one of describing access to data and equipment
TRUE
FALSE
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
Network Security
Physical Security
Database Security
Information Security
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing, Pretexting, Vishing is social engineering.
Tue
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware or rootkits.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
From the options below, which of them is not source of security treats?
Internal Treats
Unstructured Treats
Structured Treats
External Structured Treats
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?