Topic 3 MIS Information Systems Security

Topic 3 MIS Information Systems Security

University

20 Qs

quiz-placeholder

Similar activities

Batboy

Batboy

KG - University

15 Qs

CHP 3: SHORT RUN COSTS

CHP 3: SHORT RUN COSTS

University

16 Qs

Marketing and Promotion Quiz #2

Marketing and Promotion Quiz #2

University

20 Qs

journey of a river

journey of a river

KG - Professional Development

15 Qs

Module 9 Quiz

Module 9 Quiz

University

16 Qs

Questionnaire Design

Questionnaire Design

University

17 Qs

QUIZ ON INDEPENDANCEDAY

QUIZ ON INDEPENDANCEDAY

KG - University

15 Qs

Anong kwentong Raikan mo?

Anong kwentong Raikan mo?

KG - Professional Development

16 Qs

Topic 3 MIS Information Systems Security

Topic 3 MIS Information Systems Security

Assessment

Quiz

Other

University

Practice Problem

Medium

Created by

SHAHZAN (POLIKK)

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement

hacking

virus attack

data theft

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You can protect yourself against spam or fraudulent emails by:

using a spam filter

never clicking on links that you are suspicious of

being aware of different types of fraudulent email

all of the above

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A computer virus may:

overwrite your files and corrupt your data

steal important information from your computer

use a lot of memory and slow down your computer

all of the above

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

To avoid your computer being infected by malware, you should not:

download music or software from illegal sites

open emails from people you have never met

open any and all email attachments

post personal details on social networking sites

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When choosing a password you should:

use something easy to remember like your pet’s name

use a combination of letters and numbers that mean something to you but no one else

save all your passwords in a file on your computer in case you forget one

use a foreign word that will not be in an English dictionary

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the term used for a program that attaches to a computer program to spread to other computers?

Backdoor program

Keylogger

Packet analyzer

Trojan horse

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary goal of identity theft?

Enhancing social media profiles

Stealing personal information and posing as the victim

Providing financial assistance to individuals

Improving credit scores

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?