
chap 5
Authored by romani romani
Instructional Technology
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A(n) ______ has a goal of destroying data or stealing information.
hacker
cracker
script kiddie
cyberextortions
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A(n) ______ demands payment to stop an attack.
hacker
cracker
script kiddie
cyberextortions
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Another term for botnet is ______ army.
ghost
vampire
zombie
spy
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Passcode is another term for a(n) ______.
username
passphrase
encryption algorithm
PIN
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
PIN stands for personal identification ______.
number
name
network
note
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.
control
firewall
check
lock
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An iris recognition system uses technology to read patterns in the user's ______.
eye
fingerprints
signature
face
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?