CHAPTER 4 Quiz

CHAPTER 4 Quiz

University

10 Qs

quiz-placeholder

Similar activities

Mobile, Linux, and macOS Operating Systems

Mobile, Linux, and macOS Operating Systems

12th Grade - Professional Development

10 Qs

Photoshop Cropping and Resizing

Photoshop Cropping and Resizing

University

10 Qs

DEBUG APPLICATION CODE

DEBUG APPLICATION CODE

University

14 Qs

5.0DOCUMENTATION AND SAMPLING (ISA 230 AND ISA 530)

5.0 DOCUMENTATION AND SAMPLING (ISA 230 AND ISA 530)

University

10 Qs

File Protection in Operating System

File Protection in Operating System

University

8 Qs

COMPUTER PREVENTIVE MAINTENANCE FOR SOFTWARE CU2(3/6)

COMPUTER PREVENTIVE MAINTENANCE FOR SOFTWARE CU2(3/6)

University

9 Qs

OS Quiz

OS Quiz

University

10 Qs

UTS Basis Data

UTS Basis Data

University

15 Qs

CHAPTER 4 Quiz

CHAPTER 4 Quiz

Assessment

Quiz

Other

University

Easy

Created by

Ahmed Ali

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

………………… “of Salma means that she wants to have control over her personal possessions and not to be observed without her consent

Confidentiality

   Privacy

   Information policies

A.     Information technology

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

AMNA bought a new copyrighted program and shared the license key with her friends while the license of the program states that it is for a single user. This program is

Ethical software

Free software

Counterfeit software

Pirated Software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Every time WAFA goes to a website, a file is created on her computer that contains some information about her like her username and the items she added to the shopping cart. This file is a :

Adware

Cookie

Clickstream

Virus

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One of the following can be used as an attacking tool in the context of information security

Firewall

Keystroke Logger

Virtual Private network

Intrusion detection system

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Organizations should have ......... to secure the access to the internal network from unauthorized users on the internet

Anti-spam policy

Master data management

Firewall

 Antivirus

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DOAA works in a hospital. DOAA asked a nurse for her user id and password to check the results for her husband medical exam, DOAA act is considered

Phishing

Pharming

Social engineering

Pretexting

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The main difference between the worm and the virus is that

A worm must attach to something, such as an executable file, to spread. Viruses do not need to attach to anything to spread

 A virus must attach to something, such as an executable file, to spread. Worms. do not need to attach to anything to spread

No difference between them

None of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?