TEST 3 on chap 7+9+11 assesses knowledge on cybersecurity threats and preventive measures. It covers topics like computer viruses, anti-exploit software, authentication protocols, social engineering, and ransomware, focusing on understanding and preventing digital security breaches.
C2C
B2G
B2C
B2B
Rate this question:
​public attribute, class attribute
​public attribute, private attribute
Private attribute, class attribute
Class attribute, public attribute
Rate this question:
Source code
Op code
Object code
Structured English
Rate this question:
Zero-day
Brute force
Dictionary
​rootkit
Rate this question:
Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit.
A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
A USB drive containing a trojan is inserted into a device which opens a backdoor, allowing a hacker access to the device.
None of the above​
Rate this question:
Function
Goto
Method
Iteration
Rate this question:
​SIMULA
Python
​Java
COBOL
Rate this question:
Keylogger
Evil Twin
​botnet
None of the above
Rate this question:
Any sequence that includes a user name
Eight characters in length and include one or more uppercase letters, numbers, and symbols
Use of words from a dictionary
Uses default passwords such as password, admin, system, and guest.
Rate this question:
​Structured
Unstructured
​Semi-structured
None of the above
Rate this question:
​interpreter, compiler
Compiler, object code
Constant, variable
Object code, compiler
Rate this question:
Parameters
Variables
Functions
Rules
Rate this question:
​TLS
PUP
RAT
AES
Rate this question:
Sequence control structure
Sequential execution
Formal method
Programming paradigm
Rate this question:
Malware
Anti-exploit
Antivirus
Virus Signature
Rate this question:
Corrective procedures
Deterrents
Detection activities
Preventive countermeasures​
Rate this question:
Software engineering, computer programming
Computer programming, software engineering
Application programming, systems programming
Systems programming, application programming
Rate this question:
​First
Third
Fourth
Second
Rate this question:
​TLS
​RAT
PUP
DDoS
Rate this question:
Entropy
​brute force
Massive
​dictionary
Rate this question:
​reliability
Convertibility
​availability
Serviceability
Rate this question:
​​ecommerce application
Supply chain
Payment processing routine
​payment gateway
Rate this question:
Batch
Online
Inline
None of the above
Rate this question:
Detection activities
​Deterrents
Preventive countermeasures
​Corrective procedures
Rate this question:
Control structure
Flow control
Walkthrough
None of the above
Rate this question:
Declarative
Object-oriented
Procedural
None of the above
Rate this question:
​selection control structure
Decision table
Storyboard
​formal method
Rate this question:
Heuristic analysis
​port scan
Virus signature
​rootkit
Rate this question:
Repair the infection.
Conduct a heuristic analysis.
Put the infected file into quarantine.
Delete the infected file.
Rate this question:
Control
Algorithm
Syntax
Parameter
Rate this question:
C++
Prolog
COBOL
Objective C
Rate this question:
A keylogger
Firewall software
​Antivirus software
​all of the above
Rate this question:
Application
System
Unit
Integration
Rate this question:
Iteration
Abstraction
​syntax
​flow control
Rate this question:
Trojan
Virus
Worm
All of the bove
Rate this question:
​ciphertext
Firewall
Algorithm
Key
Rate this question:
Your passwords for individual sites.
​The master password
​Form data including credit card numbers.
All of the above
Rate this question:
XML
UML
HTML
DSS
Rate this question:
Permission
​Blacklist
Entropy
Content
Rate this question:
​social engineering
​rootkits
Code injection
Self-replication
Rate this question:
​Low-level languages
​High-level languages
Multiparadigm languages
First generation languages
Rate this question:
Algorithm
​predicate
​known information
​assumption
Rate this question:
Code
Control
Encapsulation
Function
Rate this question:
​function
Class attribute
Method
Control structure
Rate this question:
Desktops
​Laptops
Smartphones
All of the above
Rate this question:
Self-replicating
Spread through a process called side-loading
Self-distributing
Usually standalone executable programs
Rate this question:
​colocation
Fuzzy logic
​lights-out management
​none of the above
Rate this question:
C2C
B2B
B2C
B2G
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Intellectual Output 2: Chapter 1 Safe Use Of Internet And Social Media, Self Assesment Test
This self-assessment test covers essential aspects of safe internet and social media use, including cybersecurity threats like malware, the importance of secure connections, and...
Questions:
10 |
Attempts:
76 |
Last updated:
Aug 25, 2023
|
Computer And Network Security Practice Questions!
Dive into key concepts of computer and network security with this practice quiz! Topics include decryption, virus identification, RSA algorithm, cryptanalysis, TLS, and key...
Questions:
20 |
Attempts:
835 |
Last updated:
May 25, 2024
|
CYBER CRIMES & IPR
Explore key aspects of cybersecurity and intellectual property rights in the CYBER CRIMES & IPR quiz. Assess your understanding of viruses, phishing, illegal downloading, scams,...
Questions:
10 |
Attempts:
112 |
Last updated:
Mar 20, 2023
|
True / False Exercise-Societal Impact
This quiz evaluates understanding of cybersecurity topics like malware, hacking, and ethical hacking, emphasizing their societal impacts.
Questions:
10 |
Attempts:
249 |
Last updated:
Mar 21, 2023
|
FTC Cybersecurity Basics Quiz
Test your understanding of cybersecurity basics by selecting the correct response for each question or statement.
Questions:
5 |
Attempts:
1027 |
Last updated:
Mar 21, 2023
|
Activity 3.1 - Principals Of Cybersecurity
Based on the measures provided, select the most appropriate CIA component the measure is safeguarding against.
Questions:
7 |
Attempts:
1215 |
Last updated:
Mar 20, 2023
|
Wait!
Here's an interesting quiz for you.