Chp 3

Chp 3

11th Grade

11 Qs

quiz-placeholder

Similar activities

Office 365

Office 365

KG - University

10 Qs

Pear Deck and Progress Journals

Pear Deck and Progress Journals

1st - 12th Grade

10 Qs

Malware and Attack Technologies

Malware and Attack Technologies

9th - 12th Grade

12 Qs

L2 ICT U1 Types of Threat Quiz

L2 ICT U1 Types of Threat Quiz

11th Grade

16 Qs

BTEC IT Unit 1 - D1 Threats to data

BTEC IT Unit 1 - D1 Threats to data

10th - 12th Grade

15 Qs

What's the Word?

What's the Word?

11th Grade

10 Qs

Network Attacks

Network Attacks

9th - 12th Grade

15 Qs

Studio - U3 - LO1 - 1.3 Importance of Cyber Security

Studio - U3 - LO1 - 1.3 Importance of Cyber Security

9th Grade - University

10 Qs

Chp 3

Chp 3

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Geok Soon Sia

Used 134+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What are two common indicators of spam mail? (Choose two.)

The email has no subject line.

The email has keywords in it.

The email is from your supervisor.

The email has misspelled words or punctuation errors or both.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Data is likely to be an organisation most valuable assets.

True

False

3.

FILL IN THE BLANK QUESTION

1 min • 5 pts

What is the term used to describe an email that is targeting a specific person employed at a financial institution?

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What occurs on a computer when data goes beyond the limits of a buffer?

a system exception

cross-site scripting

an SQL injection

a buffer overflow

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does a rootkit modify?

programs

Microsoft Word

operating system

Use antivirus software

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

a type of virus

a type of worm

a type of logic bomb

a type of ransomware

7.

FILL IN THE BLANK QUESTION

1 min • 5 pts

What is the name given to a program or program code that bypasses normal authentication?

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?