CS Final Exam Answer  Sheet

CS Final Exam Answer Sheet

University

14 Qs

quiz-placeholder

Similar activities

6 L 2 2

6 L 2 2

6th Grade - University

15 Qs

WEB DESIGN

WEB DESIGN

University

12 Qs

Module 1

Module 1

University - Professional Development

10 Qs

KIỂM TRA 15P LẦN 2 HK2 ĐỀ 2 KHỐI 12 (24-25)

KIỂM TRA 15P LẦN 2 HK2 ĐỀ 2 KHỐI 12 (24-25)

10th Grade - University

10 Qs

Mix of Math,Science and Computer

Mix of Math,Science and Computer

5th Grade - Professional Development

10 Qs

Software Engineering Quiz 3

Software Engineering Quiz 3

University

10 Qs

WebGIS Bootcamp Quiz | Day 3

WebGIS Bootcamp Quiz | Day 3

University - Professional Development

10 Qs

EJ Uint 1

EJ Uint 1

University

10 Qs

CS Final Exam Answer  Sheet

CS Final Exam Answer Sheet

Assessment

Quiz

Science

University

Medium

NGSS
HS-PS4-5

Standards-aligned

Created by

Tarase Mcgee

Used 20+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the best countermeasure against social engineering?

Acceptable use policy

User awareness training

Strong passwords

Access auditing

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Anna, a user, downloaded a free pdf editing application from the internet. Now the laptop constantly displays desktop popups and several applications won't start.

Anna was the victim of which of the following?

Trojan horse

Social engineering

Worm

Spyware

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user is unable to read their computer files. A pop-up explains that the files have been encrypted and gives

instructions on how to purchase a decryption key. Which of the following BEST describes this malware?

Trojan horse

Ransomware

Spyware

Social engineering

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is it better to use a credit card than a debit card for online purchases?

Credit cards have better interest rates

Credit cards keep track of all your transactions

Credit cards have better fraud protection

Debit cards require you to pay additional fees

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively

known as_______

Spam

Illegal messages

Bloatware

Cookies

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following security measures is a form of biometrics?

Chassis intrusion detection

BIOS password

Fingerprint scanner

TPM

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following components of a successful access control framework is the process of proving that you are who you say you are?

Authentication

Access control

Accounting

Authorization

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?