Search Header Logo

Riviosn_internet threats & computer system

Authored by Amna D

Computers

9th - 12th Grade

Used 98+ times

Riviosn_internet threats & computer system
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Mona is the data security manager for a governmental organisation. One her desired goals of security is to ensure that the data can be accessed only by those who are allowed to see it. This is known as data ____________.

confidentiality

integrity

availability

publicity

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Salem opened an email attachment, but immediately after opening it, his computer froze, and all his files were encrypted. A few minutes later, a message appeared on the screen demanding that he pay 20,000 AED to remove the encryption!

What is the name of this cyberattack

Trojan horse

Scareware

Denial of Service (DOS)

Ransomware

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Lamia is working as a web developer in a company. The server of her company’s website started receiving too many requests that it could not handle. This led to service interruption, and the website is not working any more.

This type of attack is known as a ______________ attack.

brute-force

rootkit

Denial of Service (DOS)

backdoor

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which one of the below passwords is the most secure against password cracking attacks?

Password

P@55Word12!

PassWord12

WoRd5pas$_x_&&

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which one of the below passwords is the least usable for Amna for the user to enter on a mobile phone?

Password

MyPasswordConsistsOf50CharactersAnd8CapitalLetters

P@ssword123

Amna@2008

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Ahmad is trying to set a new password for his online bank account. He knows that the more complex the password is, it will be _________ secure against a password cracking attack, but that it will be the _____________ usable.

less, least

less, most

more, least

more, most

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

Look at the image concerning the levels of abstraction of how a computer works. Level C is known as the __________ domain of abstraction.

software

digital

analogue

structure

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?