Search Header Logo

Found. of IT: Security Threats - B

Computers

9th - 12th Grade

Used 12+ times

Found. of IT: Security Threats - B
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack in which the goal is to pretend to be someone else.

Spoofing

Logic Bomb

Pharming

Black Hat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Exposes security flaws for financial gain or malicious reasons.

Spoofing

Logic Bomb

Pharming

Black Hat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Redirects a request for a website to a similar looking, but fake website.

Spoofing

Logic Bomb

Pharming

Black Hat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious code that sits dormant until triggered by an event, such as a date.

Spoofing

Logic Bomb

Pharming

Black Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Looking for a person's information in the trash that can be used to carry out an attack.

Spoofing

Logic Bomb

Dumpster Diving

Black Hat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An automated password attack that uses a predetermined list of possible values.

Spoofing

Logic Bomb

Dumpster Diving

Dictionary Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of password cracking software to attempt every possible password combination.

Spoofing

Brute Force Attack

Dumpster Diving

Dictionary Attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?