
Computer Security
Authored by AJ SpaceICT
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
network compromise
information liability
technical terrorism
digital security risk
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The software used by cybercriminals is called _______________.
cyberware
conware
criminalware
crimeware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
___________ refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
cyberterrorist
script kiddie
cracker
cyberextortionist
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following statements is not true about Internet and network attacks?
No central administrator is present on the Internet.
It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements is not true about software theft?
A keygen distributes usernames and passwords to those who register their legally purchased copies of a software program.
Software piracy is the unauthorized and illegal duplication of copyrighted software.
With a single-user license agreement, users are permitted to make one copy of the software as a backup.
Software theft includes disabling or removing programs from company computers.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
a virus
a worm
a Trojan horse
a rootkit
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happens during a distributed denial-of-service (DDoS) attack?
An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic.
Antivirus software disables viruses and protects the computer or network from unauthorized access.
The police use a virus and other measures to take down a network of computer criminals.
A zombie army is used to attack computers or computer networks.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?