Found. of IT: Security Threats - B

Found. of IT: Security Threats - B

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Pregunta al azar

Pregunta al azar

1st - 12th Grade

10 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Chapter 9 & 10

Chapter 9 & 10

9th Grade

11 Qs

Cybersecurity - Device Security

Cybersecurity - Device Security

9th - 12th Grade

10 Qs

9A-computer-14-Security

9A-computer-14-Security

9th Grade

10 Qs

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

Phishing Awareness

Phishing Awareness

12th Grade

15 Qs

PH SISTEM KEAMANAN JARINGAN ASJ XII TKJ

PH SISTEM KEAMANAN JARINGAN ASJ XII TKJ

12th Grade

15 Qs

Found. of IT: Security Threats - B

Found. of IT: Security Threats - B

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack in which the goal is to pretend to be someone else.

Spoofing

Logic Bomb

Pharming

Black Hat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Exposes security flaws for financial gain or malicious reasons.

Spoofing

Logic Bomb

Pharming

Black Hat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Redirects a request for a website to a similar looking, but fake website.

Spoofing

Logic Bomb

Pharming

Black Hat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious code that sits dormant until triggered by an event, such as a date.

Spoofing

Logic Bomb

Pharming

Black Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Looking for a person's information in the trash that can be used to carry out an attack.

Spoofing

Logic Bomb

Dumpster Diving

Black Hat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An automated password attack that uses a predetermined list of possible values.

Spoofing

Logic Bomb

Dumpster Diving

Dictionary Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of password cracking software to attempt every possible password combination.

Spoofing

Brute Force Attack

Dumpster Diving

Dictionary Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?