Security and Ethics in Operating Systems

Security and Ethics in Operating Systems

University

50 Qs

quiz-placeholder

Similar activities

II wojna światowa

II wojna światowa

KG - Professional Development

54 Qs

ITC REVS

ITC REVS

University

45 Qs

B5 Research Methodology in Social Science

B5 Research Methodology in Social Science

University

48 Qs

Elobest General Knowledge quiz

Elobest General Knowledge quiz

8th Grade - Professional Development

50 Qs

Икт 4

Икт 4

University

48 Qs

Memes and School!

Memes and School!

7th Grade - University

47 Qs

SEJARAH KONTEMPORER DUNIA

SEJARAH KONTEMPORER DUNIA

12th Grade - University

50 Qs

Gagjets\ article\ stom 2-004 \2023-2024

Gagjets\ article\ stom 2-004 \2023-2024

University

50 Qs

Security and Ethics in Operating Systems

Security and Ethics in Operating Systems

Assessment

Quiz

History

University

Hard

Created by

VEIL_O cutie

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of verifying a user’s identity?

Authorization

Authentication

Encryption

Spoofing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a firewall used for?

Encrypting emails

Disguising network addresses

Detecting viruses

Repairing system damage

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack floods a server with meaningless requests?

Phishing

Denial of Service (DoS)

Spoofing

Logic Bomb

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called when a virus activates at a specific time or date?

Logic Bomb

Packet Sniffer

Time Bomb

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does antivirus software detect?

Backup data

Unauthorized access

Viruses and worms

Password breaches

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a proxy server?

A type of virus

A network that controls user access

A server that screens requests between networks

A tool to encrypt data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for unauthorized searching of files?

Wiretapping

Browsing

Packet Filtering

Cryptography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for History