Search Header Logo

DFT20083 PRE TEST S3 14092022

Authored by NURRUL ISMAIL

Computers

2nd Grade

Used 28+ times

DFT20083 PRE TEST S3 14092022
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Choose an auto-executable application of security threats

Access Attack

Social Engineering

Malicious Code Attack

DDoS Attack

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Biometric security device

Key Fob

RFID card

Password

Fingerprint

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

“Attempt to steal someone’s personal data by fraudulent websites and false emails”.

This statement refer to

Vishing

Phishing

Pretexting

Data Wiping

4.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

The strongest password setting

AbCDe1236

PAssWoRD

Qwertyuiopasd

D+11L4N0v@

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

The result of encryption perform using an algorithm.

Ciphertext

Plaintext

Wordtext

Formtext

6.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

Brute force is one of Malicious code attack

TRUE

FALSE

7.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

Every organization should develop a procedure for

reviewing employees’ computer access when they transfer

within the organization.

TRUE

FALSE

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?