PRG2

PRG2

University

50 Qs

quiz-placeholder

Similar activities

Toefl Reading Pre - Test answer sheet

Toefl Reading Pre - Test answer sheet

University

50 Qs

bahasa inggris kelas 8

bahasa inggris kelas 8

8th Grade - University

50 Qs

Pronouns

Pronouns

University

45 Qs

Final Test Grammar

Final Test Grammar

University

50 Qs

Test 2

Test 2

University

50 Qs

BỘ 5 - TEST 4 - PART 5 - ETIME

BỘ 5 - TEST 4 - PART 5 - ETIME

11th Grade - Professional Development

45 Qs

Language Use (Vocabulary Review 002)

Language Use (Vocabulary Review 002)

University

50 Qs

WW7 R2

WW7 R2

6th Grade - University

55 Qs

PRG2

PRG2

Assessment

Quiz

English

University

Practice Problem

Easy

Created by

21070585 Anh

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user notices unwanted pop-ups and advertisements while browsing. Which type of malware is likely responsible?

Adware

Trojan

Spyware

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat involves a hacker intercepting and altering messages between two parties to manipulate the conversation?

Man-in-the-middle

Phishing

SQL Injection

Spear-phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storing passwords in plain text within a database is an example of a ___________

Misconfiguration vulnerability

Physical security vulnerability

Secure configuration

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends a large number of requests to a website, causing it to slow down and become inaccessible. This is an example of what attack?

DoS

Phishing

SQL Injection

Backdoor

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are common signs of a malware infection? (Choose two)

Slow system performance

Unexpected pop-up ads

Frequent updates

Short battery life

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company notices that an unknown user has been attempting to connect to their servers using brute-force methods. What type of threat is this?

Password attack

Insider threat

Malware

Zero-day exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rootkits are easy to detect with standard antivirus software

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?