computer attacks and abuse

computer attacks and abuse

University

14 Qs

quiz-placeholder

Similar activities

INVERTER

INVERTER

University

16 Qs

velykos

velykos

University

10 Qs

Cuộc đua kì thú

Cuộc đua kì thú

University

10 Qs

Pree Test Manajemen Pendidikan Tinggi

Pree Test Manajemen Pendidikan Tinggi

University

17 Qs

I love my job!

I love my job!

6th Grade - Professional Development

17 Qs

Reservation

Reservation

University

12 Qs

HUSTer! Rung chuông vàng TOEIC!

HUSTer! Rung chuông vàng TOEIC!

University

9 Qs

EPP201

EPP201

University

10 Qs

computer attacks and abuse

computer attacks and abuse

Assessment

Quiz

Education

University

Practice Problem

Medium

Created by

NURUL ZULKEPLI

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dictionary attacks is software that generates user ID and password guesses using a dictionary of possible user IDs and passwords to reduce the number of guesses required.

Hackers will send ____ to company and use dictionary attacks to guess e-mail addresses.

Spam e-mail

blank e-mail

Phishing attack

Short message service

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cross-site scripting (XSS) is a vulnerability in dynamic web pages that allows an attacker to bypass a browser's _______mechanisms and _______ the victim's browser to execute code, thinking it came from the desired website.

Security / instruct

  Extreme / order

  Annual / hide

    Common / deceive

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spamming is

solely sending the same solicited message to one person at specific time, often in an attempt to sell something.

making an electronic communication look as if someone else sent it to gain the trust of the recipient.

reuses usernames and passwords from other data breaches to try to break into other systems

simultaneously sending the same unsolicited message to many people at the same time, often in an attempt to sell something.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is

Unauthorized access, modification or used of an electronic device or some element of a computer system

manipulating clicks numbers to inflate advertising bills.

internet to spread false or misleading information

gaining control of a computer to carry out illicit activities without user’s knowledge.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Australia, a woman got a call asking why she had sent the caller multiple adult message texts every day for the past few months. Neither she nor her mobile company could explain the texts, as her account showed that they were not coming from her phone. When she realized there was no way of blocking the messages, she changed her mobile number to avoid any further embarrassment by association.

WHAT FORM OF SPOOFING INVOLVE

E-mail spoofing

 caller ID spoofing

   SMS spoofing

   IP address spoofing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ exchanging sexually explicit text messages and revealing pictures, usually by means of phone. Posting or sharing these pictures and messages with people who were never intended to see or read them.

Cyber-bullying

   Sexting

E-mail threats

Spamming

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hijacking is gaining control of a computer to carry out ____, such as sending spam without the computer user’s knowledge.

hijack activities

illicit activities

botnet

bot herder

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?