Untitled

Untitled

20 Qs

quiz-placeholder

Similar activities

iGCSE Computer Science: Ethical & Legal Impact

iGCSE Computer Science: Ethical & Legal Impact

9th - 12th Grade

20 Qs

Computer Crimes - Lesson Two

Computer Crimes - Lesson Two

9th Grade

21 Qs

ICT 8 - Chapter 2 - Privacy Q&A

ICT 8 - Chapter 2 - Privacy Q&A

8th Grade

15 Qs

Countermeasure

Countermeasure

KG - University

23 Qs

MGMF024-Quiz 1

MGMF024-Quiz 1

University

20 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

Year 8 Computing - Cyber Crime

Year 8 Computing - Cyber Crime

8th - 9th Grade

20 Qs

Forms of Network Attack

Forms of Network Attack

10th Grade

18 Qs

Untitled

Untitled

Assessment

Quiz

Computers

Hard

Created by

Christopher Poquita

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is often used prewritten hacking and cracking programs to break into computers.

Corporate spies

Hacker

Cracker

Script Kiddies

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of malware used by intruders to make their network or internet transmission appear legitimate.

Botnet

Malware

Backdoor

Spoofing

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It refers to someone who illegally access a computer or network.

Botnet

Hacker

Cracker

Unethical Employees

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is called when a perpetrator illegally obtain registration number and contain codes.

Illegal Copying

Illegal Registration/Activation

Software Theft

Unillegal Registration/ Activation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It refers to someone who use email for extortion.

Cyber Terrorist

Corporate Spies

Cyber Extortion

Backdoor

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a data that is readable by humans into encoded character.

Data

Codes

Encryption

Password

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are all areas where digital forensics used, EXCEPT.

Law Enforcement

Philippine Statistics Authority

Military Intelligence

Insurance Agencies

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?