Search Header Logo

IS Quiz-1

Authored by aakanksha 1

Computers

University

Used 1+ times

IS Quiz-1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The below logic is an example of what kind of cyber-attack targets the vulnerabilities on the Databases?

‘ OR ‘1’=’1′ — ‘ OR ‘1’=’1′ { ‘ OR ‘1’=’1′ /*

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the X mentioning here?

Email X           – where an attacker forges the sending address of an email.

IP address X   – where an attacker alters the source IP address in a network packet to hide their identity.

Biometric X     -where an attacker produces a fake biometric sample to pose as another user

MAC X             – where an attacker modifies the Media Access Control (MAC) address of their network interface to pose as a valid user on a network.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which will not harm computer resources?

firewall

Virus

Trojan horse

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trojan-Horse programs

are legitimate programs that allow unauthorized access

are hacker programs that do not show up on the system

really do not usually work

are usually immediately discovered

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer checks the _____ of user names and passwords for a match before granting access.

Website

Network

Backup file

Data base

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All of the following are examples of real security and privacy risks. EXCEPT

Hackers

Spam

Viruses

Identity Theft

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__ is a computer crime in which a criminal breaks into a computer system for exploring details of information etc.

Hacking

Spoofing

Eavesdropping

Phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?