untitled

untitled

14 Qs

quiz-placeholder

Similar activities

อินเทอร์เน็ต Fi

อินเทอร์เน็ต Fi

5th Grade

15 Qs

Ôn tập 9 (Phần mềm trình chiếu)

Ôn tập 9 (Phần mềm trình chiếu)

KG

10 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

G6 Folder

G6 Folder

6th - 8th Grade

10 Qs

test 3.6

test 3.6

11th Grade

10 Qs

Test word buổi 1

Test word buổi 1

KG

13 Qs

Mengoperasikan Website

Mengoperasikan Website

10th Grade

10 Qs

UNIT 1.2 MEMORY

UNIT 1.2 MEMORY

10th Grade

19 Qs

untitled

untitled

Assessment

Quiz

Computers

Practice Problem

Hard

Created by

Alex Brenon-Hodas

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

DRAG AND DROP QUESTION

1 min • 1 pt

Which of the following is not a form of biometrics? (biological attributes) (a)  

Fingerprint
Retina Scan
Smart Card
Face Recognition

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone.

Which of the following digital security methods is being used?

Firewall

Smart Card

DLP

Multifactor Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company wants to use multifactor authentication. Which of the following would you most likely suggest? (think of two DIFFERENT options)

Fingerprint and retinal scan

PIN and smart card

Password and passphrase

Token and smartphone

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password attack takes advantage of people who use short, common words or combinations of words as their passwords. The hacker will try a long list of common words to figure it out?

Brute Force Attack

Traffic Interruption Attack

Keylogger Attack

Dictionary Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password attack takes place where an attacker tries to use every possible combination of letters and numbers?

Dictionary Attack

Brute Force Attack

Traffic Interruption Attack

Keylogger Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is an application or string of code attached to a file that’s designed to spread from file to file.

Worms

Viruses

Trojans

Spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Can propagate (spread) itself without a file. A malicious software that travels across computer networks, automatically replicating itself.

Virus

Worm

Trojan

Adware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?