Unit 23 DIPIT

Unit 23 DIPIT

University - Professional Development

15 Qs

quiz-placeholder

Similar activities

DFIR - Phase 2 - Detection

DFIR - Phase 2 - Detection

University

10 Qs

Summer_OOSW_1

Summer_OOSW_1

University

10 Qs

SSK30343 CNS

SSK30343 CNS

University

15 Qs

CIA Triad Quiz

CIA Triad Quiz

University

20 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

20 Qs

Exercise - Requirement Engineering

Exercise - Requirement Engineering

University

10 Qs

Web application security

Web application security

Professional Development

10 Qs

Database Design & Development- Testing & Security 1

Database Design & Development- Testing & Security 1

University

12 Qs

Unit 23 DIPIT

Unit 23 DIPIT

Assessment

Quiz

Social Studies, Computers

University - Professional Development

Hard

Created by

Shamy Shabeer

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

What is the difference between verification and validation??

Validation checks that the data you have entered matches the data you were given to enter. Verification checks that all the rules applied to that data are met

Validation checks that the correct type of data is entered, whereas verification checks that the data is actually the data you want

Verification checks that the correct type of data is entered, whereas validation checks that the data is actually the data you want

Verification checks the virus whereas validation checks the data.

2.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Which is an example of a gateway ?    

Router

Switch

Firewall

Hub

3.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

What Malicious code activated by a specific event is called? (23KLO 1.1d)

DDoS

Trojan

Logic bomb

Phishing email

4.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

 Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?

Phishing

Botnet

Scan

Encryption

5.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Malicious software collecting information about users without their knowledge/consent is known as:

 Spyware

 Eavesdropping

 Hacking Profiles

Profile

6.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Which of the following answers lists an example of spyware

Keylogger

Virus

DDoS

Worm

7.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called

Spam

Spyware

Worm

Trojan

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?