
Test 7
Authored by Bùi Tuấn
English
12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This virus, which first appeared in 2012, targeted Windows operating systems. The first item that makes this virus notable is that it was specifically designed by the U.S. government for espionage. It was discovered in May 2012 at several locations, including Iranian government sites. It is spyware that can monitor network traffic and take screenshots of the infected system. What is it?
The Bagle virus
Flame
The Mimail virus
A Nonvirus virus
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The most common way for a virus to spread is as an email attachment. This realization leads to some simple rules that will drastically reduce the odds of becoming infected with a virus. What is wrong rule?
Use a virus scanner.
Believe “security alerts” that are sent to you.
If you are not sure about an attachment, do not open it.
You might even exchange a code word with friends and colleagues.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spyware can be as simple as a ... used by a website to record a few brief facts about your visit to that website, or it could be of a more insidious type, such as a key logger.
cookie
password
address
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The most common use of a key logger is to ...
save all information
capture usernames and passwords
open all passwords
replace old password
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There are some perfectly ... uses for spyware. Some employers have embraced such spyware as a means of monitoring employee use of company technology.
elegal
legal
illegal
legacy
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Parents can also ... to use spyware on their home computer to monitor the activities of their children on the Internet.
lock
block
elect
election
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The real question is this: How does spyware get onto a computer system in the first place? The most common method is a .... It is also possible that when you visit a certain website spyware may download in the background while you are simply perusing the website.
Nonvirus virus
Trojan horse
Mimail virus
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?