ETHICS

ETHICS

University

20 Qs

quiz-placeholder

Similar activities

Privacy Quiz

Privacy Quiz

University

20 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

Chapter 1: Introduction to Cyber Security

Chapter 1: Introduction to Cyber Security

University

15 Qs

Security Threats

Security Threats

10th Grade - University

20 Qs

Computer Application Midterm Test

Computer Application Midterm Test

University

20 Qs

Computer Security Measures

Computer Security Measures

12th Grade - University

19 Qs

ETHICS

ETHICS

Assessment

Quiz

Computers

University

Hard

Created by

Deeksha Shetty

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

  1. 1.A hacker contacts your E-mail or phone and attempts to get your password is a technique that is referred as?



Fishing
Hacking
Scamming
Phishing

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

2.Which of the following is a self- replicating program that can be a source of damage to data and files stored on a given computer.

Computer vaccine
Computer allergy
Computer immune system
Computer virus

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

3.The word Ethics stands for

Scientific theories

Substances 

Understanding human nature

Legal rules

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

4.Which security refers to protecting data and computer systems against dishonesty or carelessness of employees.

Personnel security

Physical security
Network security
External security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5.These are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed.

Data sharing rights

Intellectual property rights

Computer Ethics

Data security rights

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

6. What is the term for a type of malicious software that disguises itself as a legitimate program to trick users into downloading and installing it?

Trojan horse

Spyware

Adware

Ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

7. Which of the following is a form of social engineering attack that involves tricking individuals into revealing confidential information?

Phishing

Spoofing

Denial of Service

Man-in-the-Middle

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?