Lesson 2.6 Computer Fundamentals

Lesson 2.6 Computer Fundamentals

Professional Development

16 Qs

quiz-placeholder

Similar activities

Technical Training

Technical Training

Professional Development

15 Qs

20764 - SQL - Mod 5 and 6

20764 - SQL - Mod 5 and 6

Professional Development

18 Qs

POST TEST WEB STATIC

POST TEST WEB STATIC

University - Professional Development

20 Qs

Typing words on keyboard (colours)

Typing words on keyboard (colours)

KG - Professional Development

11 Qs

HTML and CSS Review

HTML and CSS Review

3rd Grade - Professional Development

17 Qs

CSNP 04103 C++ Midterm preparation

CSNP 04103 C++ Midterm preparation

University - Professional Development

11 Qs

Telco Practice Test 1

Telco Practice Test 1

Professional Development

15 Qs

Digital Electronics (Weekend Assignment - 3)

Digital Electronics (Weekend Assignment - 3)

University - Professional Development

20 Qs

Lesson 2.6 Computer Fundamentals

Lesson 2.6 Computer Fundamentals

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Meg Perron

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Cyber attacks are classified by ______ and __________.

method

target

money

vector

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are common methods for attackers to exploit an organization for financial gain.

Ransomware

DoS and DDoS

Unauthorized access

Cryptojacking

Extortion

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

vCISOs are most likely to face attackers motivated by what? (especially in small to mid-sized organizations)

Politics

Activism

Industrial espionage

Money

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT one of the components of the CPU?

Advanced Resource Monitor (ARM)

Arithmetic Logic Unit (ALU)

Memory

Control Unit

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a type of malware that denies legitimate users access to their system and/or data and requires a payment (to the attacker) to regain access.

Virus

Ransomeware

Trojan

Worm

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is cryptojacking used for?

Elevate privilege

Steal encryption keys

Hijack an active network session

Mine bitcoin

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a common input device?

Keybaord

Microphone

Display

Mouse

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?