Chapter 5 - Internet and its uses

Chapter 5 - Internet and its uses

9th - 12th Grade

83 Qs

quiz-placeholder

Similar activities

TKJ_

TKJ_

1st - 10th Grade

80 Qs

Administrasi Sistem Jaringan XII

Administrasi Sistem Jaringan XII

12th Grade

80 Qs

Tin của tui

Tin của tui

11th Grade

88 Qs

E-tech 1st midterm (Reviewer)

E-tech 1st midterm (Reviewer)

11th Grade

80 Qs

SNT le web

SNT le web

9th - 12th Grade

86 Qs

TEST 30

TEST 30

10th Grade

80 Qs

tin học 81c

tin học 81c

10th Grade

79 Qs

Chapter 5 - Internet and its uses

Chapter 5 - Internet and its uses

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Asim Ali

Used 1+ times

FREE Resource

83 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of a brute-force attack?
A) To guess passwords by trying every possible combination
B) To intercept data being transmitted
C) To overload a system with requests
D) To infect a system with malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of a Distributed Denial of Service (DDoS) attack?
A) Involves only one attacker
B) Involves multiple computers flooding a target with traffic
C) Focuses on phishing attempts
D) Spreads spyware across a network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is defined as:
A) Unauthorized access to a computer system or network
B) Sending fraudulent emails to gain personal information
C) Redirecting users to a fake website
D) Injecting malicious software into systems

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware includes the following, EXCEPT:
A) Virus
B) Worm
C) Spyware
D) Pharming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware disguises itself as legitimate software to deceive users?
A) Virus
B) Worm
C) Trojan horse
D) Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing attacks are primarily designed to:
A) Damage files on a system
B) Deceive individuals into providing sensitive information
C) Overload a system with traffic
D) Spy on user activities through a hidden program

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social engineering refers to:
A) The manipulation of individuals into divulging confidential information
B) The development of secure networks
C) The use of encryption algorithms
D) The deployment of firewalls to block unauthorized access

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?