M5: Quiz

M5: Quiz

12th Grade

11 Qs

quiz-placeholder

Similar activities

J277 - 1.3 - Networks Basics

J277 - 1.3 - Networks Basics

9th Grade - University

15 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Quiz on Utility Applications

Quiz on Utility Applications

12th Grade

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

15 Qs

Types of Software

Types of Software

4th - 12th Grade

15 Qs

iGCSE ICT: Chapter 1

iGCSE ICT: Chapter 1

KG - University

12 Qs

Device Configuration and Management- Domains 3 & 4

Device Configuration and Management- Domains 3 & 4

9th - 12th Grade

16 Qs

Software - Common Utility Programs

Software - Common Utility Programs

3rd - 12th Grade

10 Qs

M5: Quiz

M5: Quiz

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Forcia Batoctoy

Used 2+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of intangible information asset?

Customer information

Hardware such as servers

Network equipment

Data printed on paper

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a DoS attack aim to achieve?

To disable server functions

To steal personal information

To enhance network security

To create software applications

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method of social engineering?

Spoofing

Phishing

Buffer overflow

Trash scouring

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common motivation for cybercriminals?

Educational purposes

Community service

Desire to improve technology

Financial gain

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which backup strategy captures only the data changed since the last backup?

Cloud Backup

Incremental Backup

Full Backup

Differential Backup

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a firewall?

To prevent unauthorized access

To manage user IDs

To encrypt data

To store backup data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of a Trojan horse?

Conceals itself from antivirus software

Destroys data immediately

Masquerades as a useful program

Self-replicates on infection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?