CH8 Security

CH8 Security

University

20 Qs

quiz-placeholder

Similar activities

Perubahan Organisasi dan Intervensi SDM

Perubahan Organisasi dan Intervensi SDM

University

20 Qs

E-Learning Survey

E-Learning Survey

University

16 Qs

Manajemen UMKM & Koperasi

Manajemen UMKM & Koperasi

University

20 Qs

PRE-TEST - CHAPTER 3

PRE-TEST - CHAPTER 3

University

15 Qs

Tally Prime 1

Tally Prime 1

12th Grade - Professional Development

18 Qs

Consumer Behavior Quiz

Consumer Behavior Quiz

University

20 Qs

PRINCIPLES AND PRACTICES OF MARKETING

PRINCIPLES AND PRACTICES OF MARKETING

University

20 Qs

Repaso Emprendimiento - preapración para recuperación

Repaso Emprendimiento - preapración para recuperación

University

20 Qs

CH8 Security

CH8 Security

Assessment

Quiz

Business

University

Practice Problem

Easy

Created by

Wenshin Chen

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

System security is to to prevent unauthorized access, alteration, theft, or physical damage to information systems

True

False

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The reasons that information systems are vulnerable do not include:

hardware problems

software problems

network avaliability

disasters

expensive equipment

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Internet vulnerabilities include all but:

open networks

email attachments

instant messaging

P2P communications

loss of devices

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Eavesdroppers driving by buildings and trying to detect SSID for intrusion purposes is called:

rouge access point

war driving

hacking

sniffer

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malicious software that can replicate itself is called:

sniffer

social malware

worms

viruses

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malware received through spams that can encrypt data files for blackmailing and payments is:

trojan horse

worms

injection attack

ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The type of malicious software that can monitor users' keystrokes and computing activities is:

trojan horse

spyware

worms

ransomware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?