Security

Security

10th Grade - Professional Development

34 Qs

quiz-placeholder

Similar activities

Algoritma dan Logika Informatika

Algoritma dan Logika Informatika

University

35 Qs

1. แนวปฏิบัติการสร้างความตระหนักเรื่องการรักษาความปลอดภัย

1. แนวปฏิบัติการสร้างความตระหนักเรื่องการรักษาความปลอดภัย

University

30 Qs

Informática Básica: Introdução

Informática Básica: Introdução

Professional Development

38 Qs

IKT - test

IKT - test

9th - 12th Grade

29 Qs

Introduction to Computers

Introduction to Computers

10th Grade

30 Qs

Meet, Calendar, Gmail, Chat, Drive

Meet, Calendar, Gmail, Chat, Drive

Professional Development

29 Qs

Networks & Connections Revision

Networks & Connections Revision

9th - 12th Grade

32 Qs

PTS GENAP

PTS GENAP

10th Grade

29 Qs

Security

Security

Assessment

Quiz

Computers

10th Grade - Professional Development

Practice Problem

Medium

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A DDoS attack can be best described as which of the following?

An attack carried out by flooding a server with spam data in order to keep it from handling valid requests.
A method of attacking a computer system by using packet sniffing.
Distributed denial of software attacks utilize SSL encryption and social engineering to subvert a company's security measures.
An attack that uses other computers to hack into the target system by using large amounts of data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TLS can be best defined as?

A protocol which is an upgrade to SSL and uses encryption to secure a communication channel between two parties.
A way to encrypt information that is to stored long term in data centers.
A method of communication which requires a share encryption key and the use of the SSL protocol.
A means by which a secure communication channel can be established within a local network only.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A broad term which describe many different types of malicious programs.

Malware
Viruses
Trojan horses
Anti-software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware which can replicate only when the host software it has infected is run is known as what?

Virus
Worm
Spyware
Adware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following does not describe adware?

Sending spam email to users.
Does not harm the user's computer.
Forces users to view unwanted ads through popups and other avenues.
Can be installed via other software, such as with browser plugins.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of malware can be used to track user keystrokes, visited websites and other personal data which is later sent to a bad actor (hacker).

Spyware
Adware
Sneakware
Keylogger

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Worms are best described by which of the following statements.

A type of malware which replicates entirely on its own, attempting to infect other computers.
A type of malware which can only infect another computer when the software it has infected is run.
A type of malware which usually comes as an attachment in an email is attempts to get the user to divulge personal information.
A type of malware which forces a user to view ads.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?