Search Header Logo

M5: Quiz

Authored by Forcia Batoctoy

Computers

12th Grade

Used 2+ times

M5: Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of intangible information asset?

Customer information

Hardware such as servers

Network equipment

Data printed on paper

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a DoS attack aim to achieve?

To disable server functions

To steal personal information

To enhance network security

To create software applications

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method of social engineering?

Spoofing

Phishing

Buffer overflow

Trash scouring

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common motivation for cybercriminals?

Educational purposes

Community service

Desire to improve technology

Financial gain

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which backup strategy captures only the data changed since the last backup?

Cloud Backup

Incremental Backup

Full Backup

Differential Backup

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a firewall?

To prevent unauthorized access

To manage user IDs

To encrypt data

To store backup data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of a Trojan horse?

Conceals itself from antivirus software

Destroys data immediately

Masquerades as a useful program

Self-replicates on infection

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?