Search Header Logo

3.4G Internet dilemmas

Authored by Suryani Sulong

Education

University

Used 3+ times

3.4G Internet dilemmas
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is balancing accessibility and security important in workplace networks?

To increase the speed of internet

To allow hackers easier access

To ensure employees can work efficiently while protecting data

To avoid paying for antivirus software

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a social engineering attack?

Breaking into a computer through brute force

Manipulating someone to provide confidential information

Overloading a server with traffic

Infecting a system with a worm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the key vulnerability exploited in the WannaCry ransomware attack?

Unsecured emails

Unpatched Windows systems

Outdated antivirus software

Open Wi-Fi networks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes DDOS attacks effective in disrupting services?

They hack the database directly

They lock users out of their devices

They flood servers with overwhelming traffic

They send phishing emails to employees

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a consequence of internet anonymity?

Improved download speeds

Encouragement of open speech and trolling

Enhanced firewall protection

Better performance of IoT devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are spam emails still a threat despite filtering technologies?

They can bypass firewalls through brute force

They often come from secure institutions

Some are cleverly disguised and evade filters

Spam is no longer a threat

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack method was used in the Bangladesh Bank Hack?

DDOS attack

Phishing through a fake CV with a virus

Direct database breach

Hardware destruction

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?