Search Header Logo

security part1

Authored by Yousef Ahmad Al Arabiat

Education

University

Used 10+ times

security part1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data is raw, ……………... facts that need to be processed

clear

easy to understand

organized

unorganized

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

……….. is the processed output of data making it meaningful to the person who receives it

Information

Unorganized

Raw Data

Data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

…….. refers to any crime that involves a computer and a network

Car accedent

Stealing a car

Cybercrime

Throwing 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

……... are persons who use their computer expertise to break through the security levels of a computer system or network

Hackers

Engineers

Managers

Programmers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

……….involves gaining access to a computer or network with authorisation from a company or organisation

Negative hacking

Bad hacking

Illegal hacking

Ethical hacking 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ethical hacker will help the company to ……... the security of the computer or network

improve

destroy

damage

decrease

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All of the following are  examples of Force majeure except :  

hacking

a fire

earthquakes

war

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?