Search Header Logo

Computer Security

Authored by Redhwan Al-amri

Computers

1st Grade

Used 12+ times

Computer Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Computer Security is the _________ afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A vulnerability is a __________ in an IT system that can be exploited by an attacker to deliver a successful attack

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A computer virus is a _______ application which can harm devices and files and infect them for no further use.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Attack is any ________ operation that targets computer information systems, computer networks, infrastructures, personal computer devices, or smartphones.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Malware is a type of software that is written specifically to _____ or harm the system on which it runs.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Trojan Horse is a malicious program that _________ itself and appears to be regular, harmless software.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A firewall is a network security system that monitors and controls ______ and outgoing network traffic based on predetermined security rules.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?