f you are posting anonymously in a chat room and another
anonymous poster threatens you with assault or even death, is
this person’s post harassment?
anonymous poster threatens you with assault or even death, is
this person’s post harassment?
Anonymous Quiz
10%
A. Yes; any threat of violence is harassment.
48%
B. Probably not because both parties are anonymous, so thethreat is not credible.
17%
C. Yes; chat room threats are no different from threats inperson.
24%
D. Probably not because making a chat room threat is not thesame as making a threat in person.
What must exist for cyber stalking to be illegal in a state or
territory?
territory?
Anonymous Quiz
30%
A. Specific laws against cyber stalking in that state or territory
16%
B. Specific laws against cyber stalking in that nation
43%
C. Nothing; existing stalking laws can apply
11%
D. Nothing; existing international cyber stalking laws apply
What is the first step in protecting yourself from identity theft?
Anonymous Quiz
79%
A. Never provide personal data about yourself unlessabsolutely necessary.
3%
B. Routinely check your records for signs of identity theft.
15%
C. Never use your real name on the Internet.
3%
D. Routinely check for spyware on your computer.
What can you do on your local computer to protect your
privacy?
privacy?
Anonymous Quiz
22%
A. Install a virus scanner.
13%
B. Install a firewall.
53%
C. Set your browser’s security settings.
12%
D. Set your computer’s filter settings.
What is a cookie?
Anonymous Quiz
13%
A. A piece of data that web servers gather about you
66%
B. A small file that contains data and is stored on yourcomputer
16%
C. A piece of data that your web browser gathers about you
5%
D. A small file made that contains data and then is stored onthe web server
Which of the following is not an efficient method of protecting
yourself from auction fraud?
yourself from auction fraud?
Anonymous Quiz
59%
A. Only use auctions for inexpensive items.
5%
B. Only use reputable auction sites.
14%
C. Only work with well-rated sellers.
22%
D. Only bid on items that seem realistic.
What is the top rule for chat room safety?
Anonymous Quiz
7%
A. Make certain you have antivirus software installed.
82%
B. Never use your real name or any real personally identifyingcharacteristics.
10%
C. Only use chat rooms that encrypt transmissions.
2%
D. Use chat rooms that are sponsored by well-knownwebsites or companies.
Why is it useful to have a separate credit card dedicated to
online purchases?
online purchases?
Anonymous Quiz
62%
A. If the credit card number is used illegally, you will limit yourfinancial liability.
13%
B. You can keep better track of your auction activities.
13%
C. If you are defrauded, you can possibly get the credit cardcompany to handle the problem.
12%
D. You can easily cancel that single card if you need to do so.
hat percentage of cyber stalking cases escalate to real world violence?
Anonymous Quiz
4%
A. Fewer than 1%
16%
B. About 25%
10%
C. 90% or more
69%
D. About 19%
if you are a victim of cyber stalking, what should you do to
assist the police?
assist the police?
Anonymous Quiz
9%
A. Nothing; it is their job, and you should stay out of it.
15%
B. Attempt to lure the stalker into a public place.
65%
C. Keep electronic and hard copies of all harassingcommunications.
11%
D. Try to provoke the stalker into revealing personalinformation about himself.
What is the top way to protect yourself from cyber stalking?
Anonymous Quiz
68%
A. Do not use your real identity online.
7%
B. Always use a firewall.
7%
C. Always use a virus scanner.
18%
D. Do not give out email addresses.
❤1
الى هنا نكون قد انتهينا من اسئلة الشبتر الثالث
بالتوفيق لكم جميعا🌹
بالتوفيق لكم جميعا🌹
👍3❤2
حل نموذج اختبار د ناجي.pdf
610.4 KB
حل نموذج اختبار د ناجي.pdf
IT3-PM1.pdf
444.7 KB
IT3-PM1.pdf
كل مايخص الحاسوب والبرامج (كمبيوتر -اندرويد) برمجة وغيرها
IT3-PM1.pdf
مرفق لكم درجات الاستاذ الوليد الدعيس برمجه تكامليه عملي
موفقين🌹
موفقين🌹
When considering the various attacks that can be executed
on your system, it is important to understand which attacks
are most common. Of the following, which is one of the most common and simplest attacks on a system?
on your system, it is important to understand which attacks
are most common. Of the following, which is one of the most common and simplest attacks on a system?
Anonymous Quiz
65%
A. Denial of service attack
18%
B. Buffer overflow
8%
C. Session hacking
8%
D. Password cracking
🥰1
All DoS attacks are predicated on overwhelming a system’s
workload capacity. Therefore, measuring the workload of a
system is critical. Which of the following is not a valid way to define a computer’s workload?
workload capacity. Therefore, measuring the workload of a
system is critical. Which of the following is not a valid way to define a computer’s workload?
Anonymous Quiz
18%
A. Number of simultaneous users
9%
B. Storage capacity
64%
C. Maximum voltage
9%
D. Speed of network connection
What do you call a DoS attack launched from several
machines simultaneously?
machines simultaneously?
Anonymous Quiz
3%
A. Wide-area attack
16%
B. Smurf attack
10%
C. SYN flood
71%
D. DDoS attack
It is important to understand the different types of DoS
attacks and the symptoms of those attacks. Leaving a
connection half open is a symptom of which type of attack?
attacks and the symptoms of those attacks. Leaving a
connection half open is a symptom of which type of attack?
Anonymous Quiz
20%
A. Smurf attack
15%
B. Partial attack
58%
C. SYN flood attack
7%
D. DDoS attack
While there are a wide range of different ways to execute a
DoS attack, they all are predicated on the same idea. What
is the basic concept behind a DoS attack?
DoS attack, they all are predicated on the same idea. What
is the basic concept behind a DoS attack?
Anonymous Quiz
11%
A. Computers don’t handle TCP packets well.
62%
B. Computers can handle only a finite load.
11%
C. Computers cannot handle large volumes of TCP traffic.
15%
D. Computers cannot handle large loads.
😁2
What is the most significant weakness in a DoS attack from
the attacker’s viewpoint?
the attacker’s viewpoint?
Anonymous Quiz
13%
A. The attack is often unsuccessful.
8%
B. The attack is difficult to execute.
9%
C. The attack is easy to stop.
70%
D. The attack must be sustained.