CPE315 Module 6

CPE315 Module 6

University

9 Qs

quiz-placeholder

Similar activities

Coding Quiz 1 - Term 2

Coding Quiz 1 - Term 2

9th Grade - University

12 Qs

Chapter 13 - Computer Security

Chapter 13 - Computer Security

University

10 Qs

Quiz 1

Quiz 1

University

14 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

ITE-13-Quiz-02

ITE-13-Quiz-02

University

10 Qs

Cybersecurity Quiz (NeoCyber Discord)

Cybersecurity Quiz (NeoCyber Discord)

9th Grade - University

12 Qs

THM Indore

THM Indore

University

12 Qs

ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

University

10 Qs

CPE315 Module 6

CPE315 Module 6

Assessment

Quiz

Computers

University

Medium

Created by

Monarjay Malbog

Used 4+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network.

Trojan Horse

Worm

Adware

Ransom ware

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware typically displays annoying pop-ups to generate revenue for its author?

Adware

Ransomware

Scareware

phishing

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware encrypts all data on a drive and demands payment in Bitcoin cryptocurrence to unencrypt the files?

Phishing

Scareware

Ransomware

Trojan Horse

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware attempts to convince people to divulge their personally identifable information (PII)?

phishing

rootkit

ransomware

trojan horse

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which is an example of social engineering?

a computer displaying unauthorized pop-ups and adware

an anonymous programmer directing a DDOS attack on a data center

the infection of a computer by a virus carried by a Trojan

an unidentified person claiming to be a technician collecting user information from employees

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which access attack method involves a software program that attempts to discover a system password by the use of an electronic dictionary?

Denial of Service Attack

Buffer Overflow Attack

Port Redirection Attack

Brute-Force Attack

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of a reconnaissance attack on a computer network?

To gather information about the target network and system

To redirect data traffic so that it can be monitored

To prevent users from accessing network resources

To steal data from the network servers

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

To which category of security attacks does man-in-the-middle belong?

Social Engineering

Reconnaissance

Access

DoS

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is used to provide a list of open ports on network devices?

NMAP

Tracert

Ping

Whois