CHAPTER 4 Quiz

CHAPTER 4 Quiz

University

10 Qs

quiz-placeholder

Similar activities

BCSI AWARENESS

BCSI AWARENESS

KG - Professional Development

15 Qs

DS

DS

University

8 Qs

Test Development

Test Development

University

10 Qs

Métodos y Sistemas de Trabajo - Examen Parcial 2

Métodos y Sistemas de Trabajo - Examen Parcial 2

University

13 Qs

Basic First Aid Quiz

Basic First Aid Quiz

12th Grade - University

15 Qs

Business Ethics

Business Ethics

University

10 Qs

BAC1054 Process Costing

BAC1054 Process Costing

University

15 Qs

UK Knowledge Test

UK Knowledge Test

University

10 Qs

CHAPTER 4 Quiz

CHAPTER 4 Quiz

Assessment

Quiz

Other

University

Practice Problem

Easy

Created by

Ahmed Ali

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

………………… “of Salma means that she wants to have control over her personal possessions and not to be observed without her consent

Confidentiality

   Privacy

   Information policies

A.     Information technology

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

AMNA bought a new copyrighted program and shared the license key with her friends while the license of the program states that it is for a single user. This program is

Ethical software

Free software

Counterfeit software

Pirated Software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Every time WAFA goes to a website, a file is created on her computer that contains some information about her like her username and the items she added to the shopping cart. This file is a :

Adware

Cookie

Clickstream

Virus

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One of the following can be used as an attacking tool in the context of information security

Firewall

Keystroke Logger

Virtual Private network

Intrusion detection system

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Organizations should have ......... to secure the access to the internal network from unauthorized users on the internet

Anti-spam policy

Master data management

Firewall

 Antivirus

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DOAA works in a hospital. DOAA asked a nurse for her user id and password to check the results for her husband medical exam, DOAA act is considered

Phishing

Pharming

Social engineering

Pretexting

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The main difference between the worm and the virus is that

A worm must attach to something, such as an executable file, to spread. Viruses do not need to attach to anything to spread

 A virus must attach to something, such as an executable file, to spread. Worms. do not need to attach to anything to spread

No difference between them

None of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?