CHAPTER 4 Quiz

CHAPTER 4 Quiz

University

10 Qs

quiz-placeholder

Similar activities

SPECIAL QUIZ LECTURE QUIZ MODULE 1 AND MODULE 2

SPECIAL QUIZ LECTURE QUIZ MODULE 1 AND MODULE 2

University

10 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

DIGITAL LITERACY QUIZ

DIGITAL LITERACY QUIZ

University

15 Qs

Technology in Sport

Technology in Sport

12th Grade - University

10 Qs

Computers and Operating Systems

Computers and Operating Systems

University

10 Qs

Software Engineering Fundas!

Software Engineering Fundas!

University

10 Qs

SIA 101-WEEK 1

SIA 101-WEEK 1

University

10 Qs

Virtualization and Cloud Computing

Virtualization and Cloud Computing

12th Grade - University

11 Qs

CHAPTER 4 Quiz

CHAPTER 4 Quiz

Assessment

Quiz

Other

University

Easy

Created by

Ahmed Ali

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

………………… “of Salma means that she wants to have control over her personal possessions and not to be observed without her consent

Confidentiality

   Privacy

   Information policies

A.     Information technology

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

AMNA bought a new copyrighted program and shared the license key with her friends while the license of the program states that it is for a single user. This program is

Ethical software

Free software

Counterfeit software

Pirated Software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Every time WAFA goes to a website, a file is created on her computer that contains some information about her like her username and the items she added to the shopping cart. This file is a :

Adware

Cookie

Clickstream

Virus

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One of the following can be used as an attacking tool in the context of information security

Firewall

Keystroke Logger

Virtual Private network

Intrusion detection system

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Organizations should have ......... to secure the access to the internal network from unauthorized users on the internet

Anti-spam policy

Master data management

Firewall

 Antivirus

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DOAA works in a hospital. DOAA asked a nurse for her user id and password to check the results for her husband medical exam, DOAA act is considered

Phishing

Pharming

Social engineering

Pretexting

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The main difference between the worm and the virus is that

A worm must attach to something, such as an executable file, to spread. Viruses do not need to attach to anything to spread

 A virus must attach to something, such as an executable file, to spread. Worms. do not need to attach to anything to spread

No difference between them

None of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?