checkpoint1

checkpoint1

10th Grade

7 Qs

quiz-placeholder

Similar activities

OCR GCSE CS - 2.1 ERL sorts and searches

OCR GCSE CS - 2.1 ERL sorts and searches

10th - 11th Grade

9 Qs

Dyski

Dyski

7th - 12th Grade

10 Qs

DigiTech Unit 1 Data 1

DigiTech Unit 1 Data 1

7th - 12th Grade

10 Qs

Quiz Lec2

Quiz Lec2

KG - University

10 Qs

Bài 7 Tin học 10

Bài 7 Tin học 10

10th Grade

10 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

Basic Parts of Speech EPS

Basic Parts of Speech EPS

9th - 10th Grade

10 Qs

Ứng xử trong môi trường số

Ứng xử trong môi trường số

10th Grade

10 Qs

checkpoint1

checkpoint1

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Khulood Alhosani

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Aisha opened an email attachment, but immediately after opening it, her files deleted and she cannot open it also Sarah computer file she work in same company, This malware replicates itself in order to spread from one computer to another.

What is the name of this cyberattack?

 

 

Trojan horse

    Scareware

   Denial of Service (DOS)

   Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Hesse opened an email attachment, but immediately after opening it, her computer froze, and all her files were encrypted. A few minutes later, a message appeared on screen demanding that she pay 10,000 AED to a specific account to remove the encryption!

Ransomware

    Trojan horse

    Denial of Service (DOS)

    Scareware

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Password attacks is One of the most common methods of authenticating to a website is by entering a username and password, There are different kinds of password attacks, like:

   Botnet

   Denial-of-Service

    password spraying

    Rootkit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the below passwords is the most secure against password cracking attacks?

  Password

     P@55Word12!

    PassWord12

WoRd5pas$_x_&&

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Abdulla tried to send an email to his work colleague, but he received an error message informing him that his email failed to send.


Abdulla would like to follow the troubleshooting process to fix the issue. He has already identified the problem (the first step). What is the second step in the troubleshooting process?

 Document findings, actions and outcomes

Implement prevention measures

Verify full system functionality

Establish a theory of the probable cause

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

mona her device attack with virus,  she want to use tool to tackle this security issues This protects the system from virus attacks which is 

Anti-spyware

Anti-virus software

Anti-malware software

Recovery console

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alya her device attack with virus,  she want to use tool to tackle this security issues This protects the system from virus attacks which is 

Anti-spyware

Anti-virus software

Anti-malware software

Recovery console

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?