CHAPTER 3

CHAPTER 3

University

18 Qs

quiz-placeholder

Similar activities

Indigenous American Art

Indigenous American Art

9th Grade - University

13 Qs

Hollywood and movie industry

Hollywood and movie industry

University

15 Qs

ART OF FILM

ART OF FILM

7th Grade - Professional Development

21 Qs

Color Interior Design

Color Interior Design

University

15 Qs

Molière Le Malade imaginaire acte II scène 8

Molière Le Malade imaginaire acte II scène 8

10th Grade - University

20 Qs

COLOUR THEORY

COLOUR THEORY

5th Grade - University

13 Qs

La femme gelée Rattrapage lecture intégrale

La femme gelée Rattrapage lecture intégrale

7th Grade - University

20 Qs

História da Música Ocidental I - Grécia Antiga

História da Música Ocidental I - Grécia Antiga

University

16 Qs

CHAPTER 3

CHAPTER 3

Assessment

Quiz

Arts

University

Practice Problem

Easy

Created by

KEN ROLLOQUE

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

What are two common indicators of spam mail? (Choose two.)

The email has no subject line.
The email has misspelled words or punctuation errors or both.
The email is from a friend.
The email has keywords in it.
The email is from your supervisor.

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the term used to describe an email that is targeting a specific person employed at a financial institution?

spear phishing
spyware
target phishing
spam
vishing

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?

smishing
grayware
spam
impersonation

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What does a rootkit modify?

operating system
Microsoft Word
programs
screen savers
Notepad

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the name given to a program or program code that bypasses normal authentication?

backdoor
virus
worm
Trojan
ransomware

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

a type of ransomware
a type of worm
a type of logic bomb
a type of virus

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the difference between a virus and a worm?

Worms self-replicate but viruses do not.
Viruses self-replicate but worms do not.
Worms require a host file but viruses do not.
Viruses hide in legitimate programs but worms do not

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?