
Quiz on Network and Internet Privacy and Security
Authored by Natalie Landicho
Computers
University
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of program would a hacker use to capture the password someone has typed?
keylooker
keylogger
keyloader
keyblocker
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following types of malware are designed to infect multiple files on your computer?
Worm
Virus
Trojan
Rogue Wi-fi
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A wireless network that “sniffs” traffic, making a copy of everything users type—
including usernames, passwords, and credit card numbers.
Worm
Virus
Trojan
Rogue Wi-fi
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following types of malware is likely to use your address book to spread itself to other computers?
Worm
Virus
Trojan
Rogue Wi-fi
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would be the strongest password?
August23
birmingham
NewYork
M3rl1n@t
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name of a single piece of software that looks innocent but carries out malicious activity on your computer?
Worm
Virus
Trojan
Rogue Wi-fi
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the best approach to controlling access to data?
Give users as much access as they need.
Only give users the minimum access they need.
Allow users to decide how much access they need.
Don’t give users any access.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?