
CH8 Security
Authored by Wenshin Chen
Business
University
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
System security is to to prevent unauthorized access, alteration, theft, or physical damage to information systems
True
False
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The reasons that information systems are vulnerable do not include:
hardware problems
software problems
network avaliability
disasters
expensive equipment
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Internet vulnerabilities include all but:
open networks
email attachments
instant messaging
P2P communications
loss of devices
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Eavesdroppers driving by buildings and trying to detect SSID for intrusion purposes is called:
rouge access point
war driving
hacking
sniffer
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Malicious software that can replicate itself is called:
sniffer
social malware
worms
viruses
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Malware received through spams that can encrypt data files for blackmailing and payments is:
trojan horse
worms
injection attack
ransomware
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The type of malicious software that can monitor users' keystrokes and computing activities is:
trojan horse
spyware
worms
ransomware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?