CSED 6001 Module 2

CSED 6001 Module 2

University

40 Qs

quiz-placeholder

Similar activities

Programming Logic and Design - Chapter 4 - Making Decisions

Programming Logic and Design - Chapter 4 - Making Decisions

University - Professional Development

35 Qs

Tema 5 Programación Básica

Tema 5 Programación Básica

University

35 Qs

First  QUIZ of Database - Edited by: Eng. Javier Daza 2023-1

First QUIZ of Database - Edited by: Eng. Javier Daza 2023-1

University

40 Qs

KUIS SISTEM OPERASI

KUIS SISTEM OPERASI

University

40 Qs

Kuis E-Business 2 TI 4 (POLINEMA)

Kuis E-Business 2 TI 4 (POLINEMA)

University

40 Qs

WINDOWS 10

WINDOWS 10

University

41 Qs

PL101 MIDTERM Long Quiz

PL101 MIDTERM Long Quiz

University

35 Qs

Algoritma dan Logika Informatika

Algoritma dan Logika Informatika

University

35 Qs

CSED 6001 Module 2

CSED 6001 Module 2

Assessment

Quiz

Computers

University

Hard

Created by

Kelly Cassidy

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gaining logical or physical access without permission to a computer network, system, application software, data, or other resource.

Insecure servers

Unauthorized access

Virus spreading

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What does "Hacking" mean?

The activity of using a computer to access information stored on another computer system without permission.

Servers vulnerable to be attacked.

A violation in the system of a security.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A violation in the system of a security

Breach of computer security

Legal challenges

Innovative illegal activities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which of the following are consider physical security risks?

Hardware theft
password cracking
phishing
cooking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is the name of an application that appears to look like a helpful application but instead does harm to your computer?

virus
worm
malware
Trojan horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

someone was recently caught sifting through your company's trash looking for confidential information. what is this an example of?

trash snooping
Dumpster diving
phishing
social engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IT security recently found a program on your co-worker's computer that apparently tracked all of the words that they typed into the computer. what kind of malware is this?

Keylogger 
keyblogger
trojan horse
keystroke virus

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers