Privacy, Security & Ethics

Privacy, Security & Ethics

University

25 Qs

quiz-placeholder

Similar activities

202309 BMIT27x3 Revision Quiz 2

202309 BMIT27x3 Revision Quiz 2

University

20 Qs

WNS Revision

WNS Revision

University

20 Qs

Introduction to Computers

Introduction to Computers

University

20 Qs

Ethical Hacking

Ethical Hacking

University

20 Qs

LLB10403 Quiz 2 Chap 2

LLB10403 Quiz 2 Chap 2

University

20 Qs

Cloud Architecting - Week 3

Cloud Architecting - Week 3

University

20 Qs

J836 Recap 5.4.3 Prevention Measures

J836 Recap 5.4.3 Prevention Measures

10th Grade - University

22 Qs

Business Intelligence Quiz

Business Intelligence Quiz

University

20 Qs

Privacy, Security & Ethics

Privacy, Security & Ethics

Assessment

Quiz

Computers

University

Medium

Created by

Fuhaina Ahmad

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of malicious programs or malware?

  • To enhance computer performance

  • To assist in data encryption

  • To damage or disrupt a computer system

  • To create secure networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common characteristic of worms?

  • Disguised as something else

  • Attaches to different programs

  • Fills the computer with self-replicating information

  • Spreads through unauthorized Wi-Fi networks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Botnet or Robot Network composed of?

  • Fingerprint scanners

  • Zombies

  • Encryption keys

  • Rogue Wi-Fi hotspots

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Discuss the three most common malicious programs – viruses, worms, and Trojan horses. Explain how each operates and the potential damage they can cause to computer systems

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe the principles and key components of a disaster recovery plan. How does such a plan contribute to maintaining business continuity in the face of unforeseen events or disasters?

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption protocol is commonly used to secure websites?

  • WPA2

  • HTTPS

  • VPN

  • Trojan Horse

7.

OPEN ENDED QUESTION

3 mins • 1 pt

How do archiving and search features on the web contribute to the challenges of maintaining online privacy?

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?