Riviosn_internet threats & computer system

Riviosn_internet threats & computer system

9th - 12th Grade

13 Qs

quiz-placeholder

Similar activities

Chapter 8 Week 1

Chapter 8 Week 1

9th - 12th Grade

11 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

Computer Security

Computer Security

8th - 10th Grade

10 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Computer Basics 2 - CESA

Computer Basics 2 - CESA

7th Grade - University

10 Qs

animal crossing quiz

animal crossing quiz

1st - 12th Grade

10 Qs

WAN Sesi 1

WAN Sesi 1

1st Grade - University

10 Qs

11 сыныпқа арналған тест тапсырмалары

11 сыныпқа арналған тест тапсырмалары

11th Grade

9 Qs

Riviosn_internet threats & computer system

Riviosn_internet threats & computer system

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Amna D

Used 98+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Mona is the data security manager for a governmental organisation. One her desired goals of security is to ensure that the data can be accessed only by those who are allowed to see it. This is known as data ____________.

confidentiality

integrity

availability

publicity

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Salem opened an email attachment, but immediately after opening it, his computer froze, and all his files were encrypted. A few minutes later, a message appeared on the screen demanding that he pay 20,000 AED to remove the encryption!

What is the name of this cyberattack

Trojan horse

Scareware

Denial of Service (DOS)

Ransomware

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Lamia is working as a web developer in a company. The server of her company’s website started receiving too many requests that it could not handle. This led to service interruption, and the website is not working any more.

This type of attack is known as a ______________ attack.

brute-force

rootkit

Denial of Service (DOS)

backdoor

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which one of the below passwords is the most secure against password cracking attacks?

Password

P@55Word12!

PassWord12

WoRd5pas$_x_&&

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which one of the below passwords is the least usable for Amna for the user to enter on a mobile phone?

Password

MyPasswordConsistsOf50CharactersAnd8CapitalLetters

P@ssword123

Amna@2008

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Ahmad is trying to set a new password for his online bank account. He knows that the more complex the password is, it will be _________ secure against a password cracking attack, but that it will be the _____________ usable.

less, least

less, most

more, least

more, most

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

Look at the image concerning the levels of abstraction of how a computer works. Level C is known as the __________ domain of abstraction.

software

digital

analogue

structure

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers