202309 BMIT27x3 Revision Quiz 3

202309 BMIT27x3 Revision Quiz 3

University

28 Qs

quiz-placeholder

Similar activities

Application Software

Application Software

University

26 Qs

HTML and CSS Review One

HTML and CSS Review One

7th Grade - University

23 Qs

Blockchain Workshop

Blockchain Workshop

University

25 Qs

mobile application development no 2

mobile application development no 2

University

24 Qs

EPlus Certified Graphic Design Expert

EPlus Certified Graphic Design Expert

University

25 Qs

MID DSS

MID DSS

University

23 Qs

HTML Forms - CIW SDA Lesson 6

HTML Forms - CIW SDA Lesson 6

9th Grade - University

26 Qs

IT Infrastructure

IT Infrastructure

University

25 Qs

202309 BMIT27x3 Revision Quiz 3

202309 BMIT27x3 Revision Quiz 3

Assessment

Quiz

Computers

University

Medium

Created by

MOR ONG

Used 31+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a legal form of hacking.

Contemporary hacking

Ethical hacking

Modern hacking

Modern hijacking

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A _____ is a special area to store infected files where the malware is not removable at the point of detection. Files stored in this area will not cause any harm to the computer system.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the followings will not increase the outbreak of spam emails to other users?

Spammers find emailing to be an inexpensive.

Employees respond to spam advertisements.

Spammers send junk emails frequently.

Educated users choose to ignore and delete the unsolicited messages.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A web filter is a software that _____

keeps track of the pages of your web browser displays.

sends Google and Microsoft information about your web surfing habits.

prevents unauthorized people from using your computer to surf the web.

prevents certain web pages from being displayed by your browser.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following conditions in workplace might turn a trusted user into a malicious insider? (multiple answers)

Stress at work

Frustration with superiors and colleagues

Financial problem

Job promotion

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a combination of the two words, “robot” and “network”. It refers to a number of Internet-

connected devices, each of which is running one or more bots. They can be used to perform

DDoS attacks, steal data, send spam, etc.

RobNet

BotNet

ZomNet

DosNet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the followings can be considered as a vulnerability of instant messaging?

Attachment may carry malware

Slow delivery of messages

Unavailability of privacy checkup facility

Outdated instant messaging software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?