CH8 Security

CH8 Security

University

20 Qs

quiz-placeholder

Similar activities

DeMont DeLead

DeMont DeLead

University

18 Qs

BCS Network Security Quiz 5

BCS Network Security Quiz 5

University - Professional Development

17 Qs

BMGT Ch 16-17 Review

BMGT Ch 16-17 Review

University

19 Qs

Electronic Payment Systems Surprise Quiz

Electronic Payment Systems Surprise Quiz

University

20 Qs

Macro Environment and Digital Marketing Quiz

Macro Environment and Digital Marketing Quiz

University

20 Qs

Cybersecurity - Security Threats

Cybersecurity - Security Threats

6th Grade - University

20 Qs

5.9.1: Networks and the Internet Test Prep

5.9.1: Networks and the Internet Test Prep

9th Grade - University

15 Qs

Evaluasi Training Awareness ISO 27000 - Arash Digital

Evaluasi Training Awareness ISO 27000 - Arash Digital

University

20 Qs

CH8 Security

CH8 Security

Assessment

Quiz

Business

University

Easy

Created by

Wenshin Chen

Used 8+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

System security is to to prevent unauthorized access, alteration, theft, or physical damage to information systems

True

False

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The reasons that information systems are vulnerable do not include:

hardware problems

software problems

network avaliability

disasters

expensive equipment

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Internet vulnerabilities include all but:

open networks

email attachments

instant messaging

P2P communications

loss of devices

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Eavesdroppers driving by buildings and trying to detect SSID for intrusion purposes is called:

rouge access point

war driving

hacking

sniffer

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malicious software that can replicate itself is called:

sniffer

social malware

worms

viruses

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malware received through spams that can encrypt data files for blackmailing and payments is:

trojan horse

worms

injection attack

ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The type of malicious software that can monitor users' keystrokes and computing activities is:

trojan horse

spyware

worms

ransomware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?