Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

University

13 Qs

quiz-placeholder

Similar activities

Rodzaje wirusów komputerowych

Rodzaje wirusów komputerowych

University

9 Qs

Quiz 1

Quiz 1

University

14 Qs

S3 Computing Security Quiz

S3 Computing Security Quiz

KG - University

10 Qs

Computer Security Risk

Computer Security Risk

11th Grade - University

16 Qs

Quiz for computer virus-Teacher Mae

Quiz for computer virus-Teacher Mae

University

13 Qs

Identifying Security Threats and Vulnerabilities

Identifying Security Threats and Vulnerabilities

University

10 Qs

Computer Security

Computer Security

University

16 Qs

Identity Theft

Identity Theft

University

8 Qs

 Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

Assessment

Quiz

Computers

University

Hard

Created by

Cindy Philpot

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as ___________________

impersonation theft

identity theft

scareware theft

malware theft

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a_______ attack.

steath

backdoor

denial-of-service

scareware

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Cookies are ___________________

a type of malware used to track websites you visit.

a tool used by “ransomware as a service” programs.

files installed by your operating system to speed up access to the Internet.

small text files written on your hard drive by a website you visited.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A series of commands that are executed without your knowledge is a typical attribute of a(n) ____________ virus.

script

boot-sector

time bomb

encryption

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as ___________________

trackingware

spyware

adware

scareware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Firewalls work by closing ___________________ in your computer.

software gaps

logical ports

logical doors

backdoors

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Antivirus software looks for ___________________ to detect viruses in files.

virus signatures

virus artifacts

virus bots

virus VPNs

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?