202309 BMIT27x3 Revision Quiz 3

202309 BMIT27x3 Revision Quiz 3

University

28 Qs

quiz-placeholder

Similar activities

MOC10964 Quiz

MOC10964 Quiz

University

24 Qs

EMPOWERMENT TECHNOLOGY

EMPOWERMENT TECHNOLOGY

KG - University

25 Qs

Networking Essentials V 2 Ch 1 Review

Networking Essentials V 2 Ch 1 Review

9th Grade - University

24 Qs

HTML BASICS

HTML BASICS

University

25 Qs

Internet Terminologies

Internet Terminologies

University

25 Qs

ITS302-Unit2 RC Trial Test 1

ITS302-Unit2 RC Trial Test 1

12th Grade - University

25 Qs

Information and Technology Finals

Information and Technology Finals

University

25 Qs

Operating Systems Quiz

Operating Systems Quiz

9th Grade - University

25 Qs

202309 BMIT27x3 Revision Quiz 3

202309 BMIT27x3 Revision Quiz 3

Assessment

Quiz

Computers

University

Medium

Created by

MOR ONG

Used 31+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a legal form of hacking.

Contemporary hacking

Ethical hacking

Modern hacking

Modern hijacking

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A _____ is a special area to store infected files where the malware is not removable at the point of detection. Files stored in this area will not cause any harm to the computer system.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the followings will not increase the outbreak of spam emails to other users?

Spammers find emailing to be an inexpensive.

Employees respond to spam advertisements.

Spammers send junk emails frequently.

Educated users choose to ignore and delete the unsolicited messages.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A web filter is a software that _____

keeps track of the pages of your web browser displays.

sends Google and Microsoft information about your web surfing habits.

prevents unauthorized people from using your computer to surf the web.

prevents certain web pages from being displayed by your browser.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following conditions in workplace might turn a trusted user into a malicious insider? (multiple answers)

Stress at work

Frustration with superiors and colleagues

Financial problem

Job promotion

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a combination of the two words, “robot” and “network”. It refers to a number of Internet-

connected devices, each of which is running one or more bots. They can be used to perform

DDoS attacks, steal data, send spam, etc.

RobNet

BotNet

ZomNet

DosNet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the followings can be considered as a vulnerability of instant messaging?

Attachment may carry malware

Slow delivery of messages

Unavailability of privacy checkup facility

Outdated instant messaging software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?