Search Header Logo

Chp 3

Authored by Geok Soon Sia

Computers

11th Grade

Used 135+ times

Chp 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What are two common indicators of spam mail? (Choose two.)

The email has no subject line.

The email has keywords in it.

The email is from your supervisor.

The email has misspelled words or punctuation errors or both.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Data is likely to be an organisation most valuable assets.

True

False

3.

FILL IN THE BLANK QUESTION

1 min • 5 pts

What is the term used to describe an email that is targeting a specific person employed at a financial institution?

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What occurs on a computer when data goes beyond the limits of a buffer?

a system exception

cross-site scripting

an SQL injection

a buffer overflow

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does a rootkit modify?

programs

Microsoft Word

operating system

Use antivirus software

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

a type of virus

a type of worm

a type of logic bomb

a type of ransomware

7.

FILL IN THE BLANK QUESTION

1 min • 5 pts

What is the name given to a program or program code that bypasses normal authentication?

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?