202309 BMIT27x3 Revision Quiz 3

202309 BMIT27x3 Revision Quiz 3

University

28 Qs

quiz-placeholder

Similar activities

CompTIA 1101 Practice

CompTIA 1101 Practice

University

23 Qs

ITElec1_Recitation_1

ITElec1_Recitation_1

University

25 Qs

CERI-ITLA

CERI-ITLA

10th Grade - Professional Development

25 Qs

Quiz on Operating System Basics

Quiz on Operating System Basics

University

25 Qs

2.7 System Software

2.7 System Software

12th Grade - University

25 Qs

R E V I E W E R

R E V I E W E R

University

25 Qs

Angular 4

Angular 4

University

25 Qs

C que que que

C que que que

University

23 Qs

202309 BMIT27x3 Revision Quiz 3

202309 BMIT27x3 Revision Quiz 3

Assessment

Quiz

Computers

University

Medium

Created by

MOR ONG

Used 31+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a legal form of hacking.

Contemporary hacking

Ethical hacking

Modern hacking

Modern hijacking

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A _____ is a special area to store infected files where the malware is not removable at the point of detection. Files stored in this area will not cause any harm to the computer system.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the followings will not increase the outbreak of spam emails to other users?

Spammers find emailing to be an inexpensive.

Employees respond to spam advertisements.

Spammers send junk emails frequently.

Educated users choose to ignore and delete the unsolicited messages.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A web filter is a software that _____

keeps track of the pages of your web browser displays.

sends Google and Microsoft information about your web surfing habits.

prevents unauthorized people from using your computer to surf the web.

prevents certain web pages from being displayed by your browser.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following conditions in workplace might turn a trusted user into a malicious insider? (multiple answers)

Stress at work

Frustration with superiors and colleagues

Financial problem

Job promotion

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a combination of the two words, “robot” and “network”. It refers to a number of Internet-

connected devices, each of which is running one or more bots. They can be used to perform

DDoS attacks, steal data, send spam, etc.

RobNet

BotNet

ZomNet

DosNet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the followings can be considered as a vulnerability of instant messaging?

Attachment may carry malware

Slow delivery of messages

Unavailability of privacy checkup facility

Outdated instant messaging software

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?