KMA ESP: Unit 2

KMA ESP: Unit 2

University

15 Qs

quiz-placeholder

Similar activities

CLC Lesson 6 Quiz

CLC Lesson 6 Quiz

University

12 Qs

IntroductionDatabases

IntroductionDatabases

University

20 Qs

AISB223 Chapter 12: Confidentiality and Privacy Controls

AISB223 Chapter 12: Confidentiality and Privacy Controls

University

20 Qs

Application, Business, Graphic or Web-based Software

Application, Business, Graphic or Web-based Software

University

10 Qs

KELAB KOMPUTER SMKS

KELAB KOMPUTER SMKS

12th Grade - University

12 Qs

IT dan Design Dasar

IT dan Design Dasar

University

10 Qs

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

Data Security

Data Security

12th Grade - University

17 Qs

KMA ESP: Unit 2

KMA ESP: Unit 2

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Lia Kor

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why don’t any individuals and organizations purchase software as mandated by the owner’s license agreements?

Because organizations prefer to develop their own software instead of buying.

Because software license agreements do not have any legal restrictions.

Because most software is licensed to a particular purchaser, its use is restricted to a single user or to a designated user in an organization .

Because software licenses do not typically restrict usage to a specific purchaser or designated user.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

______ hide their true nature and reveal their designed behavior only when activated?

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the statements that are TRUE

There are only 2 existing software attacks: virus and backdoor

Software components or programs of malicious code are designed to damage, destroy, or deny service to the target systems.

An expert hacker is usually a master of several programming languages, networking protocols, and operating systems and also exhibits a mastery of the technical environment of the chosen targeted system.

Answer explanation

There are many software attacks: Virus, worm, trojan horses, back door or trap door,…

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is IP (Intellectual Property)?

IP is defined as “the unrestricted right to use and share ideas without any ownership or control over their tangible or virtual representation. Anyone can freely use another person’s intellectual property without permission, payment, or credit to the source.”

IP is defined as “the ownership of ideas and control over the tangible or virtual representation of those ideas. Use of another person’s intellectual property may or may not involve royalty payments or permission, but should always include proper credit to the source.”

IP is an abbreviated way of "Internet Protocol"

IP is defined as “the lawful right to use and share ideas without any ownership or control over their tangible or virtual representation. Anyone can freely use another person’s intellectual property without permission, payment, or credit to the source.”

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who are hackers?

people who use and create mobile software to gain access to information lawfully

people who use and create computer software to gain access to information legally

people who use and create mobile software to gain access to information illegally

people who use and create computer software to gain access to information illegally

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

One of the most common method of virus transmission is via ______

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the statements that are TRUE

Before a Trojan horse can infect a machine, the user must download the server side of the malicious application.

Trade secrets, copyrights, trademarks, and patents are often considered Intellectual property.

When an organization places its Web servers in the care of a Web hosting provider, that provider assumes responsibility for all Internet services and for the hardware and operating system software used to operate the Web site.

There are two skill levels among hackers. The first is the expert hacker, or elite hacker and the novice or unskilled hacker.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?