CS 3.02 Study Guide

CS 3.02 Study Guide

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

Networks

Networks

11th Grade

35 Qs

The Internet

The Internet

7th - 12th Grade

31 Qs

MidTerm:  Intro to Cybersecurity

MidTerm: Intro to Cybersecurity

12th Grade

34 Qs

AIJ XII TKJ

AIJ XII TKJ

12th Grade

25 Qs

Perkembangan 5G

Perkembangan 5G

10th Grade

25 Qs

MID GENAP IX TIK

MID GENAP IX TIK

9th Grade

25 Qs

Grade 10 Q1 Exam

Grade 10 Q1 Exam

10th Grade

30 Qs

Tugas Kuis Bandwidth - 1

Tugas Kuis Bandwidth - 1

12th Grade

25 Qs

CS 3.02 Study Guide

CS 3.02 Study Guide

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Billy Brewer

Used 7+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a method to protect a computer from viruses?

Add an antivirus application to the computer

Download software from file sharing torrents

Never run computer updates

Open all e-mails in the inbox

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lakeyla works for a company whose partners require access to files on her computer. Why should she use an extranet?

An extranet provides controlled access to the network

An extranet provides uncontrolled access to the network

An extranet provides access of social networking to the partner

An extranet provides partners access to company financial records

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which might limit Internet connectivity?

De-encapsulation

Extranet

Internet traffic congestion

T-1 line

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which role creates user accounts on the network?

Application Role

Network User

System Administrator

User Role

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John’s computer was infected by software that attached itself to his computer and began destroying program data. What type of issue did John have?

Botnet

Trojan Horse

Virus

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gerald’s company can only transmit data using a modem. Which connection would his company use?

Wireless

Dial-Up

Fiber-Optic

T-1 Line

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After the Target customer account information was stolen from Target store transactions, Matilda found that someone else had obtained a credit card using Matilda’s personal information. This is an example of what?

Botnet Attack

Denial-of-Service Attack

Identity Fraud

Malware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?