Search Header Logo

Security and Ethics in Operating Systems

Authored by VEIL_O cutie

History

University

Security and Ethics in Operating Systems
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of verifying a user’s identity?

Authorization

Authentication

Encryption

Spoofing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a firewall used for?

Encrypting emails

Disguising network addresses

Detecting viruses

Repairing system damage

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack floods a server with meaningless requests?

Phishing

Denial of Service (DoS)

Spoofing

Logic Bomb

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called when a virus activates at a specific time or date?

Logic Bomb

Packet Sniffer

Time Bomb

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does antivirus software detect?

Backup data

Unauthorized access

Viruses and worms

Password breaches

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a proxy server?

A type of virus

A network that controls user access

A server that screens requests between networks

A tool to encrypt data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for unauthorized searching of files?

Wiretapping

Browsing

Packet Filtering

Cryptography

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?