Post-test in Online Safety, Security, Ethics and Etiquette

Post-test in Online Safety, Security, Ethics and Etiquette

University

10 Qs

quiz-placeholder

Similar activities

COVID-19

COVID-19

University

12 Qs

ANTERO Science Discussion

ANTERO Science Discussion

University

10 Qs

CHAPTER 4 Quiz

CHAPTER 4 Quiz

University

10 Qs

Fresh Hunt Quiz

Fresh Hunt Quiz

University

10 Qs

Tech Knowledge Challenge

Tech Knowledge Challenge

University

15 Qs

LEC3-02N-INFSEC

LEC3-02N-INFSEC

University

10 Qs

Information Systems Security Quiz

Information Systems Security Quiz

University

15 Qs

Especial: 150K do Resident Evil Database

Especial: 150K do Resident Evil Database

University

10 Qs

Post-test in Online Safety, Security, Ethics and Etiquette

Post-test in Online Safety, Security, Ethics and Etiquette

Assessment

Quiz

Other

University

Medium

Created by

Lorelie Panulin

Used 15+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

1. It is a stand-alone malicious software that can self replicate and propagate via computer networks w/o human help.

Virus

Worm

Trojan

Spyware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

2. It is loaded onto a user's computer without the user's knowledge and perform malicious actions and can be transferred from one computer to another

Virus

Worm

Trojan

Spyware

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

3. A program that runs in the background without you knowing it(thus called "spy") It has the ability to monitor what you are currently doing and typing through key logging.

Virus

Worm

Trojan

Spyware

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

4. It disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

Virus

Worm

Trojan

Spyware

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

5. It is used to record the keystroke done by the users. This is done to steal their password or any other sensitive information.

Virus

Trojan

Keyloggers

Spyware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

6. It's goal is to acquire sensitive personal information like passwords and credit card details.

Trojan

Spyware

Adware

Phishing

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

7. Unwanted email mostly from bots or advertisers. It can be used to send malware.

Adware

Spyware

Spam

Keyloggers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?