Study Guide Part 4 (Module 5)

Study Guide Part 4 (Module 5)

9th - 12th Grade

5 Qs

quiz-placeholder

Similar activities

KIỂM TRA TX TIN HỌC 11

KIỂM TRA TX TIN HỌC 11

9th Grade

10 Qs

Fashion Merchandising 1.01

Fashion Merchandising 1.01

9th - 12th Grade

10 Qs

Evaluación Primer Trimestre 3

Evaluación Primer Trimestre 3

12th Grade

10 Qs

Câu hỏi về thiết bị máy tính

Câu hỏi về thiết bị máy tính

7th Grade - University

10 Qs

Luiz Eloi

Luiz Eloi

1st - 12th Grade

10 Qs

C++ programing Quiz

C++ programing Quiz

12th Grade - University

10 Qs

ASJ XI-Bab 3 Remote Server

ASJ XI-Bab 3 Remote Server

11th Grade

10 Qs

Study Guide Part 4 (Module 5)

Study Guide Part 4 (Module 5)

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

KEDRAL TIMMONS

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following best describes a back door?

A file recovery method that circumvents the computer or mobile device's network.

An invisible image on a website that, if accidently clicked, downloads a virus to the user's computer or mobile device

A hardware device that reinforces security settings on a computer or network.

A program or set of instructions that allows user to bypass security controls when accessing a program computer, or network.

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?

worm

rootkit

trojan horse

virus

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?

worm

rootkit

trojan horse

virus

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following is NOT a recommended practice for gaming safety?

Avoid games requiring passwords to be saved to an online account on a smartphone.

Look for games that use ActiveX or JavaScript, as these are always safe.

Check the developer of any software or apps to be certain it is legitimate.

Use a firewall when using multiplayer online games.

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What should an AUP specify?

The acceptable use of technology by employees for personal reasons.

The guidelines for using licensed software.

A list of IP addresses known to safe

A user's personal authentication methods.