Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

quiz-placeholder

Similar activities

Basic Networking (Y8)

Basic Networking (Y8)

7th Grade - University

10 Qs

CSE_Chap1

CSE_Chap1

University

10 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

Hacking

Hacking

University

12 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Software Testing

Software Testing

University

10 Qs

Revision C1-3

Revision C1-3

University

16 Qs

Komputer dan Masyarakat

Komputer dan Masyarakat

University

10 Qs

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

Assessment

Quiz

Computers

University

Medium

Created by

E Clarke

Used 12+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pen testing - is the practice of deliberately trying to find security holes in your own systems
True
False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is there such a thing as ethical hacking?
Yes
No

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Employing a hacker to test out a system is called?
White-hat hacker
Black-hat hacker
Grey-hat hacker
Red-hat hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A feature of a strongest type of password
All lower case
Upper case and lower case
Alphanumeric
Upper & lower case, Alphanumeric and symbols

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A gateway between one network and another can be referred to as a?

Network Bridge

Ethernet cable
Proxy Server
Switch

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

HTTPS can be described as?
Unsecure protocol
Secure protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Every machine should have what installed to prevent network vulnerabilities?

Application software

Anti malware
Anti spam

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?