
PRG2
Authored by 21070585 Anh
English
University
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user notices unwanted pop-ups and advertisements while browsing. Which type of malware is likely responsible?
Adware
Trojan
Spyware
Ransomware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What threat involves a hacker intercepting and altering messages between two parties to manipulate the conversation?
Man-in-the-middle
Phishing
SQL Injection
Spear-phishing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Storing passwords in plain text within a database is an example of a ___________
Misconfiguration vulnerability
Physical security vulnerability
Secure configuration
Social engineering
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker sends a large number of requests to a website, causing it to slow down and become inaccessible. This is an example of what attack?
DoS
Phishing
SQL Injection
Backdoor
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following are common signs of a malware infection? (Choose two)
Slow system performance
Unexpected pop-up ads
Frequent updates
Short battery life
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company notices that an unknown user has been attempting to connect to their servers using brute-force methods. What type of threat is this?
Password attack
Insider threat
Malware
Zero-day exploit
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Rootkits are easy to detect with standard antivirus software
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?