Computer Security

Computer Security

University

10 Qs

quiz-placeholder

Similar activities

Soal SKD

Soal SKD

University - Professional Development

10 Qs

Week 4

Week 4

University

15 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

SAN Module 4 Quiz

SAN Module 4 Quiz

University

15 Qs

WN-CELLULAR CONCEPT

WN-CELLULAR CONCEPT

University

10 Qs

Validación de documentos

Validación de documentos

University

14 Qs

Taller de desarrollo de SW

Taller de desarrollo de SW

University

10 Qs

Què en saps de GSuite?

Què en saps de GSuite?

University - Professional Development

10 Qs

Computer Security

Computer Security

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

AJ SpaceICT

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

network compromise
information liability
technical terrorism
digital security risk

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The software used by cybercriminals is called _______________.

cyberware
conware
criminalware
crimeware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

cyberterrorist
script kiddie
cracker
cyberextortionist

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following statements is not true about Internet and network attacks?

No central administrator is present on the Internet.
It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is not true about software theft?

A keygen distributes usernames and passwords to those who register their legally purchased copies of a software program.
Software piracy is the unauthorized and illegal duplication of copyrighted software.
With a single-user license agreement, users are permitted to make one copy of the software as a backup.
Software theft includes disabling or removing programs from company computers.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

a virus
a worm
a Trojan horse
a rootkit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens during a distributed denial-of-service (DDoS) attack?

An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic.
Antivirus software disables viruses and protects the computer or network from unauthorized access.
The police use a virus and other measures to take down a network of computer criminals.
A zombie army is used to attack computers or computer networks.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?