Unit 23 DIPIT

Unit 23 DIPIT

University - Professional Development

15 Qs

quiz-placeholder

Similar activities

Multimedia Video & Animation

Multimedia Video & Animation

University

20 Qs

Django-quiz

Django-quiz

5th Grade - University

20 Qs

DreamWeaver CS6

DreamWeaver CS6

University

20 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

ASEAN

ASEAN

University

16 Qs

Banco de Dados

Banco de Dados

University - Professional Development

20 Qs

PSGY1004 Statistical Methods 1- lecture engagement quiz

PSGY1004 Statistical Methods 1- lecture engagement quiz

University

14 Qs

Unit 23 DIPIT

Unit 23 DIPIT

Assessment

Quiz

Social Studies, Computers

University - Professional Development

Practice Problem

Hard

Created by

Shamy Shabeer

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

What is the difference between verification and validation??

Validation checks that the data you have entered matches the data you were given to enter. Verification checks that all the rules applied to that data are met

Validation checks that the correct type of data is entered, whereas verification checks that the data is actually the data you want

Verification checks that the correct type of data is entered, whereas validation checks that the data is actually the data you want

Verification checks the virus whereas validation checks the data.

2.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Which is an example of a gateway ?    

Router

Switch

Firewall

Hub

3.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

What Malicious code activated by a specific event is called? (23KLO 1.1d)

DDoS

Trojan

Logic bomb

Phishing email

4.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

 Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?

Phishing

Botnet

Scan

Encryption

5.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Malicious software collecting information about users without their knowledge/consent is known as:

 Spyware

 Eavesdropping

 Hacking Profiles

Profile

6.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Which of the following answers lists an example of spyware

Keylogger

Virus

DDoS

Worm

7.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called

Spam

Spyware

Worm

Trojan

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?