Lesson 2.6 Computer Fundamentals

Lesson 2.6 Computer Fundamentals

Professional Development

16 Qs

quiz-placeholder

Similar activities

Fraud

Fraud

KG - Professional Development

13 Qs

Chapter 5: Network Security and Monitoring

Chapter 5: Network Security and Monitoring

University - Professional Development

15 Qs

Angular

Angular

Professional Development

16 Qs

Security+ Study Guide-04 Securing Your Network

Security+ Study Guide-04 Securing Your Network

Professional Development

15 Qs

Computer

Computer

1st Grade - Professional Development

18 Qs

BCIS Recap Day 4

BCIS Recap Day 4

Professional Development

15 Qs

Phishing 1

Phishing 1

Professional Development

17 Qs

DST07 Day 1 quiz

DST07 Day 1 quiz

Professional Development

12 Qs

Lesson 2.6 Computer Fundamentals

Lesson 2.6 Computer Fundamentals

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Meg Perron

Used 8+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Cyber attacks are classified by ______ and __________.

method

target

money

vector

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are common methods for attackers to exploit an organization for financial gain.

Ransomware

DoS and DDoS

Unauthorized access

Cryptojacking

Extortion

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

vCISOs are most likely to face attackers motivated by what? (especially in small to mid-sized organizations)

Politics

Activism

Industrial espionage

Money

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT one of the components of the CPU?

Advanced Resource Monitor (ARM)

Arithmetic Logic Unit (ALU)

Memory

Control Unit

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a type of malware that denies legitimate users access to their system and/or data and requires a payment (to the attacker) to regain access.

Virus

Ransomeware

Trojan

Worm

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is cryptojacking used for?

Elevate privilege

Steal encryption keys

Hijack an active network session

Mine bitcoin

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a common input device?

Keybaord

Microphone

Display

Mouse

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?