Week 3 - Computer Security/Internet

Week 3 - Computer Security/Internet

Vocational training

45 Qs

quiz-placeholder

Similar activities

CyberSecurity II

CyberSecurity II

KG - University

45 Qs

NSDA_CO_L3_Preparation_01

NSDA_CO_L3_Preparation_01

Professional Development

50 Qs

IBA TEST REVIEW

IBA TEST REVIEW

8th Grade

40 Qs

Careers and Career Exploration

Careers and Career Exploration

7th - 8th Grade

45 Qs

ICT LECTURE 3-4

ICT LECTURE 3-4

University

46 Qs

Soft Skills

Soft Skills

8th Grade

45 Qs

Pertemuan 2 Network Classificasion

Pertemuan 2 Network Classificasion

University

43 Qs

AEMT Immunologic Emergencies

AEMT Immunologic Emergencies

Professional Development

44 Qs

Week 3 - Computer Security/Internet

Week 3 - Computer Security/Internet

Assessment

Quiz

Professional Development

Vocational training

Medium

Created by

JESSICA alvarez

Used 8+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

Indicate whether the statement is true or false. 1. A worm is designed to enter a computer through the network and then take advantage of a vulnerability in an application or an operating system on the host computer and search for another computer connected to the first to infect.

True

False

2.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

Indicate whether the statement is true or false. 2. IMAP users can read their email on different devices.

True

False

3.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

Indicate whether the statement is true or false. 3. There are two (2) types of viruses, file-based and fileless based.

True

False

4.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

Indicate whether the statement is true or false. 4. Web servers distribute HTML documents based on a set of standards, or protocols, known as the Hypertext Transport Protocol (HTTP).

True

False

5.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

Indicate whether the statement is true or false. 5. With blocked top-level domain lists, email from entire countries or regions can be blocked and treated as spam.

True

False

6.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

Indicate whether the statement is true or false. 6. Most users actually receive only a small amount of spam in their local email inbox. The majority is blocked before it even reaches the user.

True

False

7.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

Indicate whether the statement is true or false. 7. Data backups only protect data against computer attacks.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?