Found. of IT: Security Threats - B

Found. of IT: Security Threats - B

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Phishing Awareness

Phishing Awareness

12th Grade

15 Qs

Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

10th Grade

15 Qs

ICT-BEd_4th Semester

ICT-BEd_4th Semester

10th Grade - University

15 Qs

Security Domain

Security Domain

11th Grade

12 Qs

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

Y9 Social Engineering

Y9 Social Engineering

9th Grade

10 Qs

Computer Crime

Computer Crime

10th - 12th Grade

7 Qs

PH3 Sistem Keamanan Jaringan Komputer

PH3 Sistem Keamanan Jaringan Komputer

11th Grade

15 Qs

Found. of IT: Security Threats - B

Found. of IT: Security Threats - B

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack in which the goal is to pretend to be someone else.

Spoofing

Logic Bomb

Pharming

Black Hat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Exposes security flaws for financial gain or malicious reasons.

Spoofing

Logic Bomb

Pharming

Black Hat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Redirects a request for a website to a similar looking, but fake website.

Spoofing

Logic Bomb

Pharming

Black Hat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious code that sits dormant until triggered by an event, such as a date.

Spoofing

Logic Bomb

Pharming

Black Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Looking for a person's information in the trash that can be used to carry out an attack.

Spoofing

Logic Bomb

Dumpster Diving

Black Hat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An automated password attack that uses a predetermined list of possible values.

Spoofing

Logic Bomb

Dumpster Diving

Dictionary Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of password cracking software to attempt every possible password combination.

Spoofing

Brute Force Attack

Dumpster Diving

Dictionary Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?