Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

University

13 Qs

quiz-placeholder

Similar activities

Malware_resumen

Malware_resumen

University

10 Qs

Identity Theft

Identity Theft

University

8 Qs

Cyber Security (OE)

Cyber Security (OE)

University

15 Qs

Computer Security Day Nov 30

Computer Security Day Nov 30

University

10 Qs

คอมพิวเตอร์และเทคโนโลยี

คอมพิวเตอร์และเทคโนโลยี

University

10 Qs

Kuiz ICT Pi Kg Ranau

Kuiz ICT Pi Kg Ranau

1st Grade - Professional Development

10 Qs

el software

el software

University

9 Qs

Seguridad Informática

Seguridad Informática

University

18 Qs

 Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

Assessment

Quiz

Computers

University

Hard

Created by

Cindy Philpot

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as ___________________

impersonation theft

identity theft

scareware theft

malware theft

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a_______ attack.

steath

backdoor

denial-of-service

scareware

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Cookies are ___________________

a type of malware used to track websites you visit.

a tool used by “ransomware as a service” programs.

files installed by your operating system to speed up access to the Internet.

small text files written on your hard drive by a website you visited.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A series of commands that are executed without your knowledge is a typical attribute of a(n) ____________ virus.

script

boot-sector

time bomb

encryption

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as ___________________

trackingware

spyware

adware

scareware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Firewalls work by closing ___________________ in your computer.

software gaps

logical ports

logical doors

backdoors

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Antivirus software looks for ___________________ to detect viruses in files.

virus signatures

virus artifacts

virus bots

virus VPNs

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?