
DFT20083 PRE TEST S3 14092022
Authored by NURRUL ISMAIL
Computers
2nd Grade
Used 28+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Choose an auto-executable application of security threats
Access Attack
Social Engineering
Malicious Code Attack
DDoS Attack
2.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Biometric security device
Key Fob
RFID card
Password
Fingerprint
3.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
“Attempt to steal someone’s personal data by fraudulent websites and false emails”.
This statement refer to
Vishing
Phishing
Pretexting
Data Wiping
4.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
The strongest password setting
AbCDe1236
PAssWoRD
Qwertyuiopasd
D+11L4N0v@
5.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
The result of encryption perform using an algorithm.
Ciphertext
Plaintext
Wordtext
Formtext
6.
MULTIPLE CHOICE QUESTION
10 sec • 5 pts
Brute force is one of Malicious code attack
TRUE
FALSE
7.
MULTIPLE CHOICE QUESTION
10 sec • 5 pts
Every organization should develop a procedure for
reviewing employees’ computer access when they transfer
within the organization.
TRUE
FALSE
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?