UIT 2221 ICT SFETY AND SECURITY (COPTPA)

Quiz
•
Computers
•
University
•
Hard
CHE (IKBN-KEMASIK)
Used 15+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- It is an important aspect of ethical issues in information technology.
- IT facilitates the users having their own hardware, operating system and software tools to access the servers that are connected to each other and to the users by a network.
Access Right
Personal Privacy
Harmful Actions
Patents
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- It is more difficult to deal with these types of ethical issues.
- A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining a copyright.
Trade Secrets
Copyright
Patents
Access Right
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- One should be aware of the liability issue in making ethical decisions.
- Software developer makes promises and assertions to the user about the nature andqualityoftheproductthatcanberestrictedasanexpresswarranty.
Liability
Trade Secrets
Piracy
Copyright
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Hackers can use it to:
> Delete, modify and capture data
> Harvest your device as part of a botnet
> Spy on your device
> Gainaccesstoyournetwork
Ransomware
Trojans
Spyware
Worm
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
.................is malicious software that denies or restricts access to your own files. Then it demands payment (usually with crypto-currencies) in return for letting you back in.
Adware & Malvertising
Spyware
Worm
Ransomware
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
________________ help hackers with all manner of malicious activities, including:
· DDoS attacks
· Keylogging, screenshots and webcam access
· Spreading other types of malware
· Sending spam and phishing messages
Bots & Botnets
Ransomware
Backdoor
Spyware
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The figure is about.......
Malvertising is the use of adware to spread malware
Spyware hides on a device and secretly records your online activity, harvesting your data and collecting personal information
The structure of Botnet
Backdoor Bypassing Security To Gain Access To A Restricted Part Of A Computer System
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
15 questions
L7: Cybersecurity Threats Quiz

Quiz
•
University
15 questions
UIT 2221 MALWARE (COPTPA)

Quiz
•
University
14 questions
cyber security

Quiz
•
KG - Professional Dev...
10 questions
CSF Week 2

Quiz
•
University
11 questions
Safeguarding Your Data Online Quiz

Quiz
•
12th Grade - University
13 questions
Identifica el tipo de ataque

Quiz
•
5th Grade - University
10 questions
Chapter 3 (fundamentals of Security)

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade