Privacy, Security & Ethics

Privacy, Security & Ethics

University

25 Qs

quiz-placeholder

Similar activities

QUIZ 2

QUIZ 2

University

20 Qs

Review Quiz (Chapter 3&4)

Review Quiz (Chapter 3&4)

University

20 Qs

C Programming Unit-1 Test-2

C Programming Unit-1 Test-2

University

20 Qs

6INFOMAN (Recitation)

6INFOMAN (Recitation)

University - Professional Development

20 Qs

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

University

20 Qs

VB

VB

University

20 Qs

Quiz Cara Membuat Google Formulir Menggunakan HP Android

Quiz Cara Membuat Google Formulir Menggunakan HP Android

9th Grade - University

20 Qs

Kuis Ms Excel

Kuis Ms Excel

12th Grade - University

20 Qs

Privacy, Security & Ethics

Privacy, Security & Ethics

Assessment

Quiz

Computers

University

Medium

Created by

Fuhaina Ahmad

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of malicious programs or malware?

  • To enhance computer performance

  • To assist in data encryption

  • To damage or disrupt a computer system

  • To create secure networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common characteristic of worms?

  • Disguised as something else

  • Attaches to different programs

  • Fills the computer with self-replicating information

  • Spreads through unauthorized Wi-Fi networks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Botnet or Robot Network composed of?

  • Fingerprint scanners

  • Zombies

  • Encryption keys

  • Rogue Wi-Fi hotspots

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Discuss the three most common malicious programs – viruses, worms, and Trojan horses. Explain how each operates and the potential damage they can cause to computer systems

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe the principles and key components of a disaster recovery plan. How does such a plan contribute to maintaining business continuity in the face of unforeseen events or disasters?

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption protocol is commonly used to secure websites?

  • WPA2

  • HTTPS

  • VPN

  • Trojan Horse

7.

OPEN ENDED QUESTION

3 mins • 1 pt

How do archiving and search features on the web contribute to the challenges of maintaining online privacy?

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?