Search Header Logo

security and protective services

Authored by Rasheda Smartt

Other

9th - 12th Grade

Used 32+ times

security and protective services
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Virus......

Someone with the technical expertise to bypass a network or operating system’s security.

Type of malware that can copy itself and infect a computer without the user’s consent or knowledge.

The act of making or keeping something or someone safe from danger, attack, or harm.

A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism.

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Worm......

Type of self-replicating program that copies itself to other computers on a network without any user intervention and consumes bandwidth and computer resources.

Computer software that is used to learn personal information, captures keystrokes and browsing information.

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Private Security.....

A self-employed individual or privately funded business entity that protects people and property.

A community effort to provide security to a group of homes.

Something owned by the city, town, or state (government).

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Select the correct item. Electronic crimes reported by IC3 would provide useful information for

Businesses.

Individuals.

Both A and B.

Only businesses in the United States.

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Select the correct item. The definition of alleged is

A form of intellectual property.

A person who carries out a crime.

Suspected.

Information that is shared with the expectation that it will remain private.

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which of the following actions relates to misuse of electronic communications?

A former employee keeps and successfully uses the password for the company he left.

An individual forwards an email message describing identity theft to he coworkers.

A judge issues a warrant to place wiretaps on a company's telephone lines where an individual who is under investigation for a federal crime works.

An individual checks work-related email while away from the office.

7.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Select the correct item. Incidents that create issues for ICE typically happen on in states

That share a border with the Gulf of Mexico.

That have a major metropolitan city.

That share a border with Mexico.

None of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?