Search Header Logo

untitled

Authored by Mrs Babu

Computers

10th Grade

untitled
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A malicious application that can record information like keystrokes, website visits and document content

Virus

Trojan

Spyware

Adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Sending emails in an attempt to gain money or information from people due to a made up reason

Blagging

Phishing

Social Engineering

Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You get a phone call from someone pretending to be from microsoft, they ask for your log in details and password

Phishing

Blagging

Brute Force

Hacking

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a secure password

REXTHEDOG

a1b2c3d4e5

Ma!rX7@dE4

abcdef12345

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Limiting the access that different users have to the network is called

User rights

Access Rights

User Levels

Access Levels

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security that uses a measurement of the human body such as fingerprint scanners are called

Biomes

Biometrics

Biosecurity

Biomass

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Prevents someone from having unlimited attempts at guessing your password

CAPTCHA

Anti-Virus

Keylogger

Malware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?