Chapter 3 Quiz

Chapter 3 Quiz

University

11 Qs

quiz-placeholder

Similar activities

Examen Tema 1 - Simulación

Examen Tema 1 - Simulación

University

11 Qs

Vocabulary Quiz - Computer - 01

Vocabulary Quiz - Computer - 01

12th Grade - University

10 Qs

Arquitetura de Software - Arquitetura Cliente-Servidor

Arquitetura de Software - Arquitetura Cliente-Servidor

University

15 Qs

Conocimientos previos

Conocimientos previos

University

12 Qs

Fundamentos Web

Fundamentos Web

University

15 Qs

¿Cuánto sabes sobre la tecnología que cambia al mundo?

¿Cuánto sabes sobre la tecnología que cambia al mundo?

University

10 Qs

UAS Sistem Operasi Open Source

UAS Sistem Operasi Open Source

University

10 Qs

Práctica Informática Básica

Práctica Informática Básica

University

16 Qs

Chapter 3 Quiz

Chapter 3 Quiz

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Kevin Wong

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

What are two common indicators of spam mail? (Choose two.)

The email has misspelled words or punctuation errors or both.

The email is from your supervisor.

The email has keywords in it

The email has no subject line.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Data is likely to be an organisation most valuable assets. True or False?

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image


What is the term used to describe an email that is targeting a specific person employed at a financial institution?

Vishing

phishing

spear phishing

pharming

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


What occurs on a computer when data goes beyond the limits of a buffer?

cross-site scripting

a system exception

a buffer overflow

an SQL injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What does a rootkit modify?

programs

Microsoft Word

operating system

Use antivirus software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

a type of logic bomb

a type of ransomware

a type of virus

a type of worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the name given to a program or program code that bypasses normal authentication?

front door

Ctrl+Alt+Del

backdoor

TGIF

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?