Search Header Logo

untitled

Authored by Alaa Awadh

Computers

11th Grade

untitled
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious software which can monitor your use of the computer quietly in the background.

Spyware

Trojan

Worm

Anti-virus

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Select ALL the weak or bad passwords.

davidtan123

1029931250

passw0rd

B!u3r@bb1t

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is phishing?

The creator send out a legitimate looking emails to target users.

Act of gaining unauthorised access to a computer system

Software that gather data by monitoring key presses on the user's keyboard

Malicious code installed on user's computer or on a web server

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is the correct term? Software that monitors all data arriving and leaving your computer.

Encryption

Virus

Backup

Firewall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a firewall?

Filters emails sent by an attacker

Prevents malware and hackers from accessing a system

Blocks unauthorised access in to and out of a network

All of the above

6.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

The word malware stands for

___________ software.

Pick the missing word

malfunctioning

malformed

malignant

malicious

7.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

How can a Trojan infect your computer?

Through security loopholes

Suspicious web links

Disguised as legitimate software

Email attachments

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?