CHAPTER 4 Quiz

CHAPTER 4 Quiz

University

10 Qs

quiz-placeholder

Similar activities

SPREADSHEET

SPREADSHEET

University

13 Qs

ADB Quiz #1

ADB Quiz #1

University

15 Qs

IT files types for gender neutral Apache helicopters

IT files types for gender neutral Apache helicopters

KG - Professional Development

13 Qs

Computer Science

Computer Science

University

10 Qs

Operating Systems Quiz 1

Operating Systems Quiz 1

University

15 Qs

SOUND

SOUND

University

15 Qs

Technology Quiz

Technology Quiz

University

6 Qs

1. Intro to CC and  AWS

1. Intro to CC and AWS

University

15 Qs

CHAPTER 4 Quiz

CHAPTER 4 Quiz

Assessment

Quiz

Other

University

Easy

Created by

Ahmed Ali

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

………………… “of Salma means that she wants to have control over her personal possessions and not to be observed without her consent

Confidentiality

   Privacy

   Information policies

A.     Information technology

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

AMNA bought a new copyrighted program and shared the license key with her friends while the license of the program states that it is for a single user. This program is

Ethical software

Free software

Counterfeit software

Pirated Software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Every time WAFA goes to a website, a file is created on her computer that contains some information about her like her username and the items she added to the shopping cart. This file is a :

Adware

Cookie

Clickstream

Virus

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One of the following can be used as an attacking tool in the context of information security

Firewall

Keystroke Logger

Virtual Private network

Intrusion detection system

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Organizations should have ......... to secure the access to the internal network from unauthorized users on the internet

Anti-spam policy

Master data management

Firewall

 Antivirus

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DOAA works in a hospital. DOAA asked a nurse for her user id and password to check the results for her husband medical exam, DOAA act is considered

Phishing

Pharming

Social engineering

Pretexting

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The main difference between the worm and the virus is that

A worm must attach to something, such as an executable file, to spread. Viruses do not need to attach to anything to spread

 A virus must attach to something, such as an executable file, to spread. Worms. do not need to attach to anything to spread

No difference between them

None of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?