Search Header Logo

CH8 Security

Authored by Wenshin Chen

Business

University

Used 8+ times

CH8 Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

System security is to to prevent unauthorized access, alteration, theft, or physical damage to information systems

True

False

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The reasons that information systems are vulnerable do not include:

hardware problems

software problems

network avaliability

disasters

expensive equipment

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Internet vulnerabilities include all but:

open networks

email attachments

instant messaging

P2P communications

loss of devices

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Eavesdroppers driving by buildings and trying to detect SSID for intrusion purposes is called:

rouge access point

war driving

hacking

sniffer

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malicious software that can replicate itself is called:

sniffer

social malware

worms

viruses

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malware received through spams that can encrypt data files for blackmailing and payments is:

trojan horse

worms

injection attack

ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The type of malicious software that can monitor users' keystrokes and computing activities is:

trojan horse

spyware

worms

ransomware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?