
review checkpoint 1 10 general
Authored by sajedah al-hilo
Computers
1st - 4th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The cyberattack that tries to guess the password by trying different _____________________ is known as a brute force attack.
character combinations
IP addresses
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A(/An) ___________ is an exchange where one gives up one thing in order to get something else that one also wants.
virus
trade-off
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A(/An) ____________ malware aims to encrypt computer files and ask for money from the owner to recover the data.
ransomware
trojan
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A (/An) ______________cyberattack tries to send huge amount of network traffic to the host until it stops working.
denial of service
dot on supply
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware that delivers advertisements to a user on a web browser automatically is called adware.
true
falsa
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Worm malware replicates itself and spreads from one computer to another through the network.
true
false
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The degree to which something is fit to be used is known as usability.
true
false
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?