KMA ESP: Unit 2

KMA ESP: Unit 2

University

15 Qs

quiz-placeholder

Similar activities

İstifadəçi interfeysi

İstifadəçi interfeysi

University

15 Qs

Emerging Technologies

Emerging Technologies

University

20 Qs

Quiz 1 | Information Security | Kali Linux Commands

Quiz 1 | Information Security | Kali Linux Commands

University

20 Qs

Quiz KTI

Quiz KTI

University

20 Qs

HCI GOMS quiz

HCI GOMS quiz

University

15 Qs

ViewSonic LCD Training

ViewSonic LCD Training

12th Grade - University

15 Qs

Titanic Challenge

Titanic Challenge

University

16 Qs

komputasi awan

komputasi awan

University

15 Qs

KMA ESP: Unit 2

KMA ESP: Unit 2

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Lia Kor

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why don’t any individuals and organizations purchase software as mandated by the owner’s license agreements?

Because organizations prefer to develop their own software instead of buying.

Because software license agreements do not have any legal restrictions.

Because most software is licensed to a particular purchaser, its use is restricted to a single user or to a designated user in an organization .

Because software licenses do not typically restrict usage to a specific purchaser or designated user.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

______ hide their true nature and reveal their designed behavior only when activated?

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the statements that are TRUE

There are only 2 existing software attacks: virus and backdoor

Software components or programs of malicious code are designed to damage, destroy, or deny service to the target systems.

An expert hacker is usually a master of several programming languages, networking protocols, and operating systems and also exhibits a mastery of the technical environment of the chosen targeted system.

Answer explanation

There are many software attacks: Virus, worm, trojan horses, back door or trap door,…

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is IP (Intellectual Property)?

IP is defined as “the unrestricted right to use and share ideas without any ownership or control over their tangible or virtual representation. Anyone can freely use another person’s intellectual property without permission, payment, or credit to the source.”

IP is defined as “the ownership of ideas and control over the tangible or virtual representation of those ideas. Use of another person’s intellectual property may or may not involve royalty payments or permission, but should always include proper credit to the source.”

IP is an abbreviated way of "Internet Protocol"

IP is defined as “the lawful right to use and share ideas without any ownership or control over their tangible or virtual representation. Anyone can freely use another person’s intellectual property without permission, payment, or credit to the source.”

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who are hackers?

people who use and create mobile software to gain access to information lawfully

people who use and create computer software to gain access to information legally

people who use and create mobile software to gain access to information illegally

people who use and create computer software to gain access to information illegally

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

One of the most common method of virus transmission is via ______

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the statements that are TRUE

Before a Trojan horse can infect a machine, the user must download the server side of the malicious application.

Trade secrets, copyrights, trademarks, and patents are often considered Intellectual property.

When an organization places its Web servers in the care of a Web hosting provider, that provider assumes responsibility for all Internet services and for the hardware and operating system software used to operate the Web site.

There are two skill levels among hackers. The first is the expert hacker, or elite hacker and the novice or unskilled hacker.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?