computer attacks and abuse

computer attacks and abuse

University

14 Qs

quiz-placeholder

Similar activities

Quizzical series - Marketing management

Quizzical series - Marketing management

University - Professional Development

10 Qs

KUIZ MICROSOFT WORD

KUIZ MICROSOFT WORD

University

11 Qs

cybersecurity

cybersecurity

University

10 Qs

Online habits

Online habits

University

10 Qs

Drones

Drones

KG - Professional Development

17 Qs

4

4

University

10 Qs

HOSPM 2100 QUIZ 1

HOSPM 2100 QUIZ 1

University

10 Qs

DIGITAL MARKETING 2

DIGITAL MARKETING 2

University

15 Qs

computer attacks and abuse

computer attacks and abuse

Assessment

Quiz

Education

University

Medium

Created by

NURUL ZULKEPLI

Used 5+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dictionary attacks is software that generates user ID and password guesses using a dictionary of possible user IDs and passwords to reduce the number of guesses required.

Hackers will send ____ to company and use dictionary attacks to guess e-mail addresses.

Spam e-mail

blank e-mail

Phishing attack

Short message service

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cross-site scripting (XSS) is a vulnerability in dynamic web pages that allows an attacker to bypass a browser's _______mechanisms and _______ the victim's browser to execute code, thinking it came from the desired website.

Security / instruct

  Extreme / order

  Annual / hide

    Common / deceive

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spamming is

solely sending the same solicited message to one person at specific time, often in an attempt to sell something.

making an electronic communication look as if someone else sent it to gain the trust of the recipient.

reuses usernames and passwords from other data breaches to try to break into other systems

simultaneously sending the same unsolicited message to many people at the same time, often in an attempt to sell something.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is

Unauthorized access, modification or used of an electronic device or some element of a computer system

manipulating clicks numbers to inflate advertising bills.

internet to spread false or misleading information

gaining control of a computer to carry out illicit activities without user’s knowledge.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Australia, a woman got a call asking why she had sent the caller multiple adult message texts every day for the past few months. Neither she nor her mobile company could explain the texts, as her account showed that they were not coming from her phone. When she realized there was no way of blocking the messages, she changed her mobile number to avoid any further embarrassment by association.

WHAT FORM OF SPOOFING INVOLVE

E-mail spoofing

 caller ID spoofing

   SMS spoofing

   IP address spoofing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ exchanging sexually explicit text messages and revealing pictures, usually by means of phone. Posting or sharing these pictures and messages with people who were never intended to see or read them.

Cyber-bullying

   Sexting

E-mail threats

Spamming

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hijacking is gaining control of a computer to carry out ____, such as sending spam without the computer user’s knowledge.

hijack activities

illicit activities

botnet

bot herder

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?