Study Guide Part 4 (Module 5)

Study Guide Part 4 (Module 5)

9th - 12th Grade

5 Qs

quiz-placeholder

Similar activities

Visual Basic 2010

Visual Basic 2010

8th Grade - University

10 Qs

Contact Center Sevices

Contact Center Sevices

7th - 10th Grade

10 Qs

Questionário Aula 6 - Int. à Inf. (Segurança e Proteção)

Questionário Aula 6 - Int. à Inf. (Segurança e Proteção)

10th Grade

10 Qs

Cuestionario Steve Jobs

Cuestionario Steve Jobs

12th Grade - University

10 Qs

Fondo de pantalla

Fondo de pantalla

10th Grade

10 Qs

Software-Chapter 6

Software-Chapter 6

7th - 10th Grade

10 Qs

ICT as Platform for Change

ICT as Platform for Change

11th - 12th Grade

10 Qs

emtech

emtech

12th Grade

10 Qs

Study Guide Part 4 (Module 5)

Study Guide Part 4 (Module 5)

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

KEDRAL TIMMONS

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following best describes a back door?

A file recovery method that circumvents the computer or mobile device's network.

An invisible image on a website that, if accidently clicked, downloads a virus to the user's computer or mobile device

A hardware device that reinforces security settings on a computer or network.

A program or set of instructions that allows user to bypass security controls when accessing a program computer, or network.

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?

worm

rootkit

trojan horse

virus

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?

worm

rootkit

trojan horse

virus

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following is NOT a recommended practice for gaming safety?

Avoid games requiring passwords to be saved to an online account on a smartphone.

Look for games that use ActiveX or JavaScript, as these are always safe.

Check the developer of any software or apps to be certain it is legitimate.

Use a firewall when using multiplayer online games.

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What should an AUP specify?

The acceptable use of technology by employees for personal reasons.

The guidelines for using licensed software.

A list of IP addresses known to safe

A user's personal authentication methods.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?