Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

quiz-placeholder

Similar activities

C++ Switch  and If Else Statements

C++ Switch and If Else Statements

University

15 Qs

Intro to Data Mining

Intro to Data Mining

University

15 Qs

Database Design

Database Design

University

16 Qs

Java Quiz 3

Java Quiz 3

University

15 Qs

Firewall and Network Security

Firewall and Network Security

University

15 Qs

Big Data Analytics - Week 2 (Data storage)

Big Data Analytics - Week 2 (Data storage)

University - Professional Development

10 Qs

ADVACOMT-Quiz No.1 (final term)

ADVACOMT-Quiz No.1 (final term)

University

15 Qs

Control de calidad y pruebas

Control de calidad y pruebas

University

10 Qs

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

Assessment

Quiz

Computers

University

Medium

Created by

E Clarke

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pen testing - is the practice of deliberately trying to find security holes in your own systems
True
False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is there such a thing as ethical hacking?
Yes
No

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Employing a hacker to test out a system is called?
White-hat hacker
Black-hat hacker
Grey-hat hacker
Red-hat hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A feature of a strongest type of password
All lower case
Upper case and lower case
Alphanumeric
Upper & lower case, Alphanumeric and symbols

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A gateway between one network and another can be referred to as a?

Network Bridge

Ethernet cable
Proxy Server
Switch

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

HTTPS can be described as?
Unsecure protocol
Secure protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Every machine should have what installed to prevent network vulnerabilities?

Application software

Anti malware
Anti spam

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?