Chapter 3 Cybersecurity

Chapter 3 Cybersecurity

University

12 Qs

quiz-placeholder

Similar activities

Quiz No. 1 - Computer Basics

Quiz No. 1 - Computer Basics

University

10 Qs

Komunikasi dalam Jaringan (AKL 1)

Komunikasi dalam Jaringan (AKL 1)

University

10 Qs

Chapter 3 (fundamentals of Security)

Chapter 3 (fundamentals of Security)

University

10 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Unit 1 Terminology

Unit 1 Terminology

University

13 Qs

Building a Website - Basics

Building a Website - Basics

10th Grade - University

17 Qs

CSF Week 2

CSF Week 2

University

10 Qs

Understanding Networks1

Understanding Networks1

8th Grade - University

10 Qs

Chapter 3 Cybersecurity

Chapter 3 Cybersecurity

Assessment

Quiz

Computers

University

Medium

Created by

Ria Castillo

Used 3+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)

intimidation

Urgency

compassion

honesty

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

Cross-site scripting

buffer overflow

XML injection

SQL injection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

social engineering

phishing

vishing

Trojan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?

adware

spyware

virus

phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name for the type of software that generates revenue by generating annoying pop-ups?

trackers

pop-ups

spyware

adware

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two ways to protect a computer from malware? (Choose two.)

Defragment the hard disk.

Use antivirus software.

Keep software up to date.

Empty the browser cache.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a rootkit modify?

Notepad

operating system

programs

Microsoft Word

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?