3.4G Internet dilemmas

3.4G Internet dilemmas

University

20 Qs

quiz-placeholder

Similar activities

Introduction to personality psychology

Introduction to personality psychology

University

20 Qs

Research Methodology Quiz

Research Methodology Quiz

12th Grade - University

20 Qs

Introduction to Research

Introduction to Research

University

18 Qs

Quiz on Operational Definitions and Research Design

Quiz on Operational Definitions and Research Design

University

20 Qs

Research Sampling

Research Sampling

University

15 Qs

Quiz

Quiz

University

18 Qs

Data Visualization in Power BI

Data Visualization in Power BI

University

20 Qs

Summative Test in Practical Research 1

Summative Test in Practical Research 1

11th Grade - University

15 Qs

3.4G Internet dilemmas

3.4G Internet dilemmas

Assessment

Quiz

Education

University

Easy

Created by

Suryani Sulong

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is balancing accessibility and security important in workplace networks?

To increase the speed of internet

To allow hackers easier access

To ensure employees can work efficiently while protecting data

To avoid paying for antivirus software

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a social engineering attack?

Breaking into a computer through brute force

Manipulating someone to provide confidential information

Overloading a server with traffic

Infecting a system with a worm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the key vulnerability exploited in the WannaCry ransomware attack?

Unsecured emails

Unpatched Windows systems

Outdated antivirus software

Open Wi-Fi networks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes DDOS attacks effective in disrupting services?

They hack the database directly

They lock users out of their devices

They flood servers with overwhelming traffic

They send phishing emails to employees

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a consequence of internet anonymity?

Improved download speeds

Encouragement of open speech and trolling

Enhanced firewall protection

Better performance of IoT devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are spam emails still a threat despite filtering technologies?

They can bypass firewalls through brute force

They often come from secure institutions

Some are cleverly disguised and evade filters

Spam is no longer a threat

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack method was used in the Bangladesh Bank Hack?

DDOS attack

Phishing through a fake CV with a virus

Direct database breach

Hardware destruction

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?