CH8 Security

CH8 Security

University

20 Qs

quiz-placeholder

Similar activities

Cybersecurity - Security Threats

Cybersecurity - Security Threats

6th Grade - University

20 Qs

Evaluasi Training Awareness ISO 27000 - Arash Digital

Evaluasi Training Awareness ISO 27000 - Arash Digital

University

20 Qs

DeMont DeLead

DeMont DeLead

University

18 Qs

Quiz E-Business Design

Quiz E-Business Design

University

20 Qs

BCS Network Security Quiz 5

BCS Network Security Quiz 5

University - Professional Development

17 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

BMGT Ch 16-17 Review

BMGT Ch 16-17 Review

University

19 Qs

Pop Quiz: MKT558 Digital Marketing Chapter 2

Pop Quiz: MKT558 Digital Marketing Chapter 2

University

20 Qs

CH8 Security

CH8 Security

Assessment

Quiz

Business

University

Easy

Created by

Wenshin Chen

Used 8+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

System security is to to prevent unauthorized access, alteration, theft, or physical damage to information systems

True

False

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The reasons that information systems are vulnerable do not include:

hardware problems

software problems

network avaliability

disasters

expensive equipment

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Internet vulnerabilities include all but:

open networks

email attachments

instant messaging

P2P communications

loss of devices

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Eavesdroppers driving by buildings and trying to detect SSID for intrusion purposes is called:

rouge access point

war driving

hacking

sniffer

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malicious software that can replicate itself is called:

sniffer

social malware

worms

viruses

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malware received through spams that can encrypt data files for blackmailing and payments is:

trojan horse

worms

injection attack

ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The type of malicious software that can monitor users' keystrokes and computing activities is:

trojan horse

spyware

worms

ransomware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?