
Found. of IT: Security Threats - B
Computers
9th - 12th Grade
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attack in which the goal is to pretend to be someone else.
Spoofing
Logic Bomb
Pharming
Black Hat
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Exposes security flaws for financial gain or malicious reasons.
Spoofing
Logic Bomb
Pharming
Black Hat
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Redirects a request for a website to a similar looking, but fake website.
Spoofing
Logic Bomb
Pharming
Black Hat
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious code that sits dormant until triggered by an event, such as a date.
Spoofing
Logic Bomb
Pharming
Black Hat
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Looking for a person's information in the trash that can be used to carry out an attack.
Spoofing
Logic Bomb
Dumpster Diving
Black Hat
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An automated password attack that uses a predetermined list of possible values.
Spoofing
Logic Bomb
Dumpster Diving
Dictionary Attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Use of password cracking software to attempt every possible password combination.
Spoofing
Brute Force Attack
Dumpster Diving
Dictionary Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?