Post-test in Online Safety, Security, Ethics and Etiquette

Post-test in Online Safety, Security, Ethics and Etiquette

University

10 Qs

quiz-placeholder

Similar activities

KEAMANAN KOMPUTER

KEAMANAN KOMPUTER

University

15 Qs

SEC CH 3 review

SEC CH 3 review

University

12 Qs

Networking Today (1.7-1.9)

Networking Today (1.7-1.9)

University

10 Qs

Cyber Security

Cyber Security

University

10 Qs

Intro to Cybersecurity

Intro to Cybersecurity

University

13 Qs

Cybersecurity 101

Cybersecurity 101

University

10 Qs

Review Ch. 1-5

Review Ch. 1-5

University

10 Qs

Seminar Keamanan Digital

Seminar Keamanan Digital

University

15 Qs

Post-test in Online Safety, Security, Ethics and Etiquette

Post-test in Online Safety, Security, Ethics and Etiquette

Assessment

Quiz

Other

University

Medium

Created by

Lorelie Panulin

Used 14+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

1. It is a stand-alone malicious software that can self replicate and propagate via computer networks w/o human help.

Virus

Worm

Trojan

Spyware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

2. It is loaded onto a user's computer without the user's knowledge and perform malicious actions and can be transferred from one computer to another

Virus

Worm

Trojan

Spyware

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

3. A program that runs in the background without you knowing it(thus called "spy") It has the ability to monitor what you are currently doing and typing through key logging.

Virus

Worm

Trojan

Spyware

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

4. It disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

Virus

Worm

Trojan

Spyware

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

5. It is used to record the keystroke done by the users. This is done to steal their password or any other sensitive information.

Virus

Trojan

Keyloggers

Spyware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

6. It's goal is to acquire sensitive personal information like passwords and credit card details.

Trojan

Spyware

Adware

Phishing

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

7. Unwanted email mostly from bots or advertisers. It can be used to send malware.

Adware

Spyware

Spam

Keyloggers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?