Chapter 2.  08/31/2023

Chapter 2. 08/31/2023

University

7 Qs

quiz-placeholder

Similar activities

Textes Officiels EPS

Textes Officiels EPS

University

12 Qs

13 American Colonies

13 American Colonies

University

9 Qs

SALES G's & S's

SALES G's & S's

University

9 Qs

LA PROSPERIDAD FALAZ

LA PROSPERIDAD FALAZ

12th Grade - University

10 Qs

Trivia questions

Trivia questions

1st Grade - University

10 Qs

S3.23_BUSM4573 W3: Designing Presentations

S3.23_BUSM4573 W3: Designing Presentations

University

10 Qs

Marcos Ágiles

Marcos Ágiles

University

10 Qs

Toefl Exercise Skills 11-13

Toefl Exercise Skills 11-13

University

10 Qs

Chapter 2.  08/31/2023

Chapter 2. 08/31/2023

Assessment

Quiz

University

Practice Problem

Hard

Created by

Alejandro Falcon

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

As the complexity of a network increases, the possibility of security breaches decreases.

True
False

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Discovery of a vulnerability in a software program can potentially be sold to the government.

True
False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Even legitimate organizations sometimes use worms, unsolicited email messages sent to large numbers of people, to promote their products.

True
False

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely facing a vishing attack

True
False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.

lone wolf attacker
industrial spy
hacktivist
cyberterrorist

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____.

a CAPTCHA issue
a distributed denial-of-service attack
too many Spam emails
a logic bomb

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a denial-of-service (DDoS) attack, the perpetrator ____.

instructs the zombie computers to send simple access requests to target computers
sends out a huge number of spam emails to everyone in your contacts list
changes the configuration information of the infected computers
refuses to accept any email from any sender

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?