Chapter 2.  08/31/2023

Chapter 2. 08/31/2023

University

7 Qs

quiz-placeholder

Similar activities

HTC_Lesson 10

HTC_Lesson 10

University

10 Qs

AVCi

AVCi

University - Professional Development

10 Qs

PBFP - Phases of Matter

PBFP - Phases of Matter

University

10 Qs

IS - DAS - SOCASIS - Sem 4

IS - DAS - SOCASIS - Sem 4

University

12 Qs

Cuestionario Documental HOME

Cuestionario Documental HOME

University

10 Qs

Funciones multivariables

Funciones multivariables

University

10 Qs

Quality

Quality

12th Grade - University

10 Qs

Present perfect simple

Present perfect simple

University

10 Qs

Chapter 2.  08/31/2023

Chapter 2. 08/31/2023

Assessment

Quiz

University

Practice Problem

Hard

Created by

Alejandro Falcon

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

As the complexity of a network increases, the possibility of security breaches decreases.

True
False

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Discovery of a vulnerability in a software program can potentially be sold to the government.

True
False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Even legitimate organizations sometimes use worms, unsolicited email messages sent to large numbers of people, to promote their products.

True
False

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely facing a vishing attack

True
False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.

lone wolf attacker
industrial spy
hacktivist
cyberterrorist

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____.

a CAPTCHA issue
a distributed denial-of-service attack
too many Spam emails
a logic bomb

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a denial-of-service (DDoS) attack, the perpetrator ____.

instructs the zombie computers to send simple access requests to target computers
sends out a huge number of spam emails to everyone in your contacts list
changes the configuration information of the infected computers
refuses to accept any email from any sender