Search Header Logo

Exercise Topic 9

Authored by JAZURAINIFARIZA JAAFAR

Computers

University

Used 12+ times

Exercise Topic 9
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is digital security?

Protection against physical theft

Safeguarding digital information from unauthorized access

Monitoring internet usage

None of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware?

Firewall

Spyware

Antivirus software

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does phishing aim to do?

Protect user data

Steal sensitive information by masquerading as a trustworthy entity

Improve network speed

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method for cybercriminals to deliver malware?

Opening infected email attachments

Using secure passwords

Regularly updating software

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle is NOT part of social engineering tactics?

Authority

Intimidation

Trustworthiness

Transparency

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack aims to overload a server with traffic?

Phishing attack

Denial of Service (DoS)

Man-in-the-middle attack

None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware hides itself and allows remote control over a device?

Virus

Rootkit

Worm

Adware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers