Search Header Logo

ck1 10 adv 1 review

Authored by sajedah al-hilo

Computers

3rd Grade

Used 14+ times

ck1 10 adv 1 review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Noora is the social media manager for a governmental organisation. The information for these types of accounts should only be accessed by those who are assigned by the organisation. 

Protecting data in this way is an example of data ____________. 

a.     confidentiality

d.     publicity

c.     availability

b.     integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Noora opened an email attachment, but immediately after opening it, her computer froze, and all her files were encrypted. A few minutes later, a message appeared on screen demanding that she pay 10,000 AED to a specific account to remove the encryption!

 

What is the name of this cyberattack?

a.     Trojan horse

d.     Ransomware

c.     Denial of Service (DOS)

b.     Scareware

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alia opened a file that was on her USB drive at work. Immediately her computer slowed and did not function as expected. Shortly afterwards a number of work colleagues on the same network noticed their computers slowing down and not working as normal. It seems like all the computers on the network reported the same thing.

 

What type of attack was used to infect all the computers in the work network?

a.     Adware

d.     On-path attack

c.     Social engineering

b.     Worms

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Khaled has just been the victim of a password attack. He used the password ‘password’ for all his bank accounts and social media accounts.

 

By using the common used password ‘password’, the cybercriminal was able to gain access to Khaled’s account and many others by using the _________ technique. This technique tries the same common password across many usernames.

a.     brute-force

d.     dictionary

c.     password spraying

b.     rainbow

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which one of the below passwords is the most secure against password cracking attacks?

 

a.     Password

d.     WoRd5pas$_x_&&

c.     PassWord12

b.     P@55Word12!

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Ahmad is trying to set a new password for his online bank account. He knows that the __________ complex the password is, it will be _________ secure against a password cracking attack, but that it will be the _____________ usable.

 

a.    less, more, least

d.    more, more, least

c.     less, more, most

b.    more, less, most

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

Look at the image to the right concerning the levels of abstraction of how a computer works.

 

Level B is known as the __________ domain of abstraction.

 

a.    software

d.    structure

c.     analogue

b.    digital

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?