Search Header Logo

икт 8 неделя+половина 10 недели

Authored by Evelina Ugai

Computers

University

икт 8 неделя+половина 10 недели
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of cyber security?

To protect systems, networks, and data from cyber threats

To install antivirus software

To prevent hardware failures

To limit internet access

To make computers faster

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of malware?

Firewall

VPN

Multi-factor authentication

Ransomware

Encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A type of firewall

A cyber-attack that tricks users into revealing personal information

A method of encrypting sensitive information

A technique for testing network security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A method of strengthening password security

A virus that spreads through email attachments

A cyber-attack that lasts for less than a day

A security flaw that has been patched by software vendors

A security flaw that is unknown to the vendor and has no fix yet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security practice helps prevent unauthorized access to accounts?

Storing passwords in a text file

Using the same password for all accounts

Ignoring software updates

Disabling frewalls

Enabling multi-factor authentication (MFA)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall?

To monitor and control incoming and outgoing network traffic

To back up important data

To store and manage passwords securely

To detect physical threats to a system

To increase internet speed

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a Denial-of-Service (DoS) attack do?

Encrypts user files and demands ransom

Overloads a system or network to make it unavailable

Steals sensitive user data

Improves system performance

Scans a system for vulnerabilities

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?