UIT 2221 ICT SFETY AND SECURITY (COPTPA)

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

University

10 Qs

quiz-placeholder

Similar activities

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

 Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

University

13 Qs

Cybersecurity Fundamentals Week 3 Quiz

Cybersecurity Fundamentals Week 3 Quiz

KG - University

10 Qs

Computer Science Unit 1 review

Computer Science Unit 1 review

University

12 Qs

Malware

Malware

University

10 Qs

Chapter 2- Malicious Code

Chapter 2- Malicious Code

University

15 Qs

Computer quiz

Computer quiz

4th Grade - Professional Development

10 Qs

ITE-13-Quiz01

ITE-13-Quiz01

University

10 Qs

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

Assessment

Quiz

Computers

University

Hard

Created by

CHE (IKBN-KEMASIK)

Used 15+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

- It is an important aspect of ethical issues in information technology.

- IT facilitates the users having their own hardware, operating system and software tools to access the servers that are connected to each other and to the users by a network.

Access Right

Personal Privacy

Harmful Actions

Patents

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

- It is more difficult to deal with these types of ethical issues.

- A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining a copyright.

Trade Secrets

Copyright

Patents

Access Right

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

- One should be aware of the liability issue in making ethical decisions.

- Software developer makes promises and assertions to the user about the nature andqualityoftheproductthatcanberestrictedasanexpresswarranty.

Liability

Trade Secrets

Piracy

Copyright

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Hackers can use it to:

> Delete, modify and capture data

> Harvest your device as part of a botnet

> Spy on your device

> Gainaccesstoyournetwork

Ransomware

Trojans

Spyware

Worm

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

.................is malicious software that denies or restricts access to your own files. Then it demands payment (usually with crypto-currencies) in return for letting you back in.

Adware & Malvertising

Spyware

Worm

Ransomware

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

________________ help hackers with all manner of malicious activities, including:

·       DDoS attacks

·       Keylogging, screenshots and webcam access

·       Spreading other types of malware

·       Sending spam and phishing messages

Bots & Botnets

Ransomware

Backdoor

Spyware

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

The figure is about.......

Malvertising is the use of adware to spread malware

 

Spyware hides on a device and secretly records your online activity, harvesting your data and collecting personal information

The structure of Botnet

Backdoor Bypassing Security To Gain Access To A Restricted Part Of A Computer System

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?