
security and protective services
Authored by Rasheda Smartt
Other
9th - 12th Grade
Used 32+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Virus......
Someone with the technical expertise to bypass a network or operating system’s security.
Type of malware that can copy itself and infect a computer without the user’s consent or knowledge.
The act of making or keeping something or someone safe from danger, attack, or harm.
A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism.
2.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Worm......
Type of self-replicating program that copies itself to other computers on a network without any user intervention and consumes bandwidth and computer resources.
Computer software that is used to learn personal information, captures keystrokes and browsing information.
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers
3.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Private Security.....
A self-employed individual or privately funded business entity that protects people and property.
A community effort to provide security to a group of homes.
Something owned by the city, town, or state (government).
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Select the correct item. Electronic crimes reported by IC3 would provide useful information for
Businesses.
Individuals.
Both A and B.
Only businesses in the United States.
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Select the correct item. The definition of alleged is
A form of intellectual property.
A person who carries out a crime.
Suspected.
Information that is shared with the expectation that it will remain private.
6.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which of the following actions relates to misuse of electronic communications?
A former employee keeps and successfully uses the password for the company he left.
An individual forwards an email message describing identity theft to he coworkers.
A judge issues a warrant to place wiretaps on a company's telephone lines where an individual who is under investigation for a federal crime works.
An individual checks work-related email while away from the office.
7.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Select the correct item. Incidents that create issues for ICE typically happen on in states
That share a border with the Gulf of Mexico.
That have a major metropolitan city.
That share a border with Mexico.
None of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?