XÓA

XÓA

University

50 Qs

quiz-placeholder

Similar activities

UNIT 1 PRE TOEIC

UNIT 1 PRE TOEIC

University

45 Qs

The Crew and Its Responsibilities

The Crew and Its Responsibilities

University

51 Qs

Leap 3_U7_LS2-3

Leap 3_U7_LS2-3

University

50 Qs

Unit 3,4,5

Unit 3,4,5

University

50 Qs

Chapter 8 - Site Access

Chapter 8 - Site Access

University

50 Qs

Quiz: Units 7 and 8 interchange 2a

Quiz: Units 7 and 8 interchange 2a

University

50 Qs

Technical Terms: Informatics Engineering

Technical Terms: Informatics Engineering

University

45 Qs

XÓA

XÓA

Assessment

Quiz

English

University

Hard

Created by

21070585 Anh

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user notices unwanted pop-ups and advertisements while browsing. Which type of malware is likely responsible?

Adware

Trojan

Spyware

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat involves a hacker intercepting and altering messages between two parties to manipulate the conversation?

Man-in-the-middle

Phishing

SQL Injection

Spear-phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storing passwords in plain text within a database is an example of a ___________

Misconfiguration vulnerability

Physical security vulnerability

Secure configuration

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends a large number of requests to a website, causing it to slow down and become inaccessible. This is an example of what attack?

DoS

Phishing

SQL Injection

Backdoor

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are common signs of a malware infection? (Choose two)

Slow system performance

Unexpected pop-up ads

Frequent updates

Short battery life

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company notices that an unknown user has been attempting to connect to their servers using brute-force methods. What type of threat is this?

Password attack

Insider threat

Malware

Zero-day exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rootkits are easy to detect with standard antivirus software

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?