UIT 2221 ICT SFETY AND SECURITY (COPTPA)

Quiz
•
Computers
•
University
•
Hard
CHE (IKBN-KEMASIK)
Used 15+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- It is an important aspect of ethical issues in information technology.
- IT facilitates the users having their own hardware, operating system and software tools to access the servers that are connected to each other and to the users by a network.
Access Right
Personal Privacy
Harmful Actions
Patents
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- It is more difficult to deal with these types of ethical issues.
- A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining a copyright.
Trade Secrets
Copyright
Patents
Access Right
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- One should be aware of the liability issue in making ethical decisions.
- Software developer makes promises and assertions to the user about the nature andqualityoftheproductthatcanberestrictedasanexpresswarranty.
Liability
Trade Secrets
Piracy
Copyright
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Hackers can use it to:
> Delete, modify and capture data
> Harvest your device as part of a botnet
> Spy on your device
> Gainaccesstoyournetwork
Ransomware
Trojans
Spyware
Worm
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
.................is malicious software that denies or restricts access to your own files. Then it demands payment (usually with crypto-currencies) in return for letting you back in.
Adware & Malvertising
Spyware
Worm
Ransomware
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
________________ help hackers with all manner of malicious activities, including:
· DDoS attacks
· Keylogging, screenshots and webcam access
· Spreading other types of malware
· Sending spam and phishing messages
Bots & Botnets
Ransomware
Backdoor
Spyware
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The figure is about.......
Malvertising is the use of adware to spread malware
Spyware hides on a device and secretly records your online activity, harvesting your data and collecting personal information
The structure of Botnet
Backdoor Bypassing Security To Gain Access To A Restricted Part Of A Computer System
Create a free account and access millions of resources
Similar Resources on Wayground
13 questions
computer essintials 2

Quiz
•
University
15 questions
Computer Applications in Banking and Finance Quiz

Quiz
•
University
10 questions
Malware

Quiz
•
University
15 questions
System Unit

Quiz
•
10th Grade - University
15 questions
Computer Component

Quiz
•
University
15 questions
6th Grade Media Quiz

Quiz
•
KG - University
10 questions
Basics of Computers

Quiz
•
University
11 questions
CHAPTER 2: Developing Your Security Policy

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Would you rather...

Quiz
•
KG - University
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
10 questions
The Constitution, the Articles, and Federalism Crash Course US History

Interactive video
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
16 questions
Water Modeling Activity

Lesson
•
11th Grade - University
10 questions
ACT English prep

Quiz
•
9th Grade - University