checkpoint1

checkpoint1

10th Grade

7 Qs

quiz-placeholder

Similar activities

ITGS: Chapter Three - Software

ITGS: Chapter Three - Software

9th - 10th Grade

10 Qs

KiCA Quizzes

KiCA Quizzes

KG - University

12 Qs

Information Privacy

Information Privacy

1st - 12th Grade

10 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Computer Misuse Act

Computer Misuse Act

10th - 12th Grade

12 Qs

Internet Security

Internet Security

9th - 11th Grade

10 Qs

security and ethic 1

security and ethic 1

10th Grade

12 Qs

checkpoint1

checkpoint1

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Khulood Alhosani

Used 9+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Aisha opened an email attachment, but immediately after opening it, her files deleted and she cannot open it also Sarah computer file she work in same company, This malware replicates itself in order to spread from one computer to another.

What is the name of this cyberattack?

 

 

Trojan horse

    Scareware

   Denial of Service (DOS)

   Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Hesse opened an email attachment, but immediately after opening it, her computer froze, and all her files were encrypted. A few minutes later, a message appeared on screen demanding that she pay 10,000 AED to a specific account to remove the encryption!

Ransomware

    Trojan horse

    Denial of Service (DOS)

    Scareware

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Password attacks is One of the most common methods of authenticating to a website is by entering a username and password, There are different kinds of password attacks, like:

   Botnet

   Denial-of-Service

    password spraying

    Rootkit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the below passwords is the most secure against password cracking attacks?

  Password

     P@55Word12!

    PassWord12

WoRd5pas$_x_&&

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Abdulla tried to send an email to his work colleague, but he received an error message informing him that his email failed to send.


Abdulla would like to follow the troubleshooting process to fix the issue. He has already identified the problem (the first step). What is the second step in the troubleshooting process?

 Document findings, actions and outcomes

Implement prevention measures

Verify full system functionality

Establish a theory of the probable cause

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

mona her device attack with virus,  she want to use tool to tackle this security issues This protects the system from virus attacks which is 

Anti-spyware

Anti-virus software

Anti-malware software

Recovery console

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alya her device attack with virus,  she want to use tool to tackle this security issues This protects the system from virus attacks which is 

Anti-spyware

Anti-virus software

Anti-malware software

Recovery console