
Chapter 5 - Internet and its uses
Authored by Asim Ali
Computers
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
83 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of a brute-force attack?
A) To guess passwords by trying every possible combination
B) To intercept data being transmitted
C) To overload a system with requests
D) To infect a system with malware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a characteristic of a Distributed Denial of Service (DDoS) attack?
A) Involves only one attacker
B) Involves multiple computers flooding a target with traffic
C) Focuses on phishing attempts
D) Spreads spyware across a network
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hacking is defined as:
A) Unauthorized access to a computer system or network
B) Sending fraudulent emails to gain personal information
C) Redirecting users to a fake website
D) Injecting malicious software into systems
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware includes the following, EXCEPT:
A) Virus
B) Worm
C) Spyware
D) Pharming
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which malware disguises itself as legitimate software to deceive users?
A) Virus
B) Worm
C) Trojan horse
D) Ransomware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing attacks are primarily designed to:
A) Damage files on a system
B) Deceive individuals into providing sensitive information
C) Overload a system with traffic
D) Spy on user activities through a hidden program
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Social engineering refers to:
A) The manipulation of individuals into divulging confidential information
B) The development of secure networks
C) The use of encryption algorithms
D) The deployment of firewalls to block unauthorized access
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?