data security23.1.4

data security23.1.4

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Unit 2.1 IGCSE Data Transmission

Unit 2.1 IGCSE Data Transmission

10th - 11th Grade

20 Qs

SYSTEM LIFE CYCLE

SYSTEM LIFE CYCLE

9th - 10th Grade

20 Qs

6.2 Data Integrity Cambridge iAS 9618

6.2 Data Integrity Cambridge iAS 9618

11th Grade

20 Qs

Methods of Error Detection

Methods of Error Detection

9th Grade

13 Qs

unit 2: error detection

unit 2: error detection

9th - 12th Grade

13 Qs

Data Transmission

Data Transmission

10th - 12th Grade

11 Qs

2.2 Error detection

2.2 Error detection

10th Grade

18 Qs

2.5 Detecting errors in data transmission

2.5 Detecting errors in data transmission

9th Grade - University

15 Qs

data security23.1.4

data security23.1.4

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

ashley zheng

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which act is the brute-force attack?

Sending a large amount of requirements to let the web server to be overload.

Repeating entering different passwords until enter the correct one.

Sending out a legitimate-looking email to users.

Compromising a computer and use the host's storage and processing power

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one can not avoid the brute-force attack?

Use simple password.

Two step verification.

Biometric password.

Limited time of entry.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the difference between virus and worms?

Virus are more professional than worms.

Virus are more intricate than worms.

Virus can self-replicate but worms can not.

Virus can not stand alone but worms can.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature below is the most suitable for the ransomwares?

Self-replicate to occupy the storage in PC.

Encrypt the file and demand paying for decryption.

Records everything that is typed on the keyboard.

Track user's internet surfing activities for advertising

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one can not avoid the accidental damage?

Back up

Could storage

Disk mirroring

Shut down without checking

 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's botnet?

Softwares that will tell the user that there is a big problem with their computer, and they need to download something else to fix it.

Malwares send irritating  advertisements.

Malware will compromise a PC and use the host's storage and processing power to perform jobs.

Providing the creator unauthorized remote access to an infected computer.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which validation is not suitable for a candidate name validation?

Presence validation

Range validation

Type validation

Format validation

 

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?