css_quiz_10.08.10

css_quiz_10.08.10

Professional Development

10 Qs

quiz-placeholder

Similar activities

Mothers Competition

Mothers Competition

Professional Development

10 Qs

FSDA OW Sec. Amsterdam

FSDA OW Sec. Amsterdam

Professional Development

10 Qs

JavaScript Quiz

JavaScript Quiz

Professional Development

10 Qs

Digitalization of Performance task on LMS- KALINGA

Digitalization of Performance task on LMS- KALINGA

Professional Development

15 Qs

Quiz Game

Quiz Game

KG - Professional Development

12 Qs

Digital Technology Office 365 - 29May2020

Digital Technology Office 365 - 29May2020

University - Professional Development

13 Qs

Trg@home 1

Trg@home 1

Professional Development

10 Qs

Topic Quiz-1 : Python Basics

Topic Quiz-1 : Python Basics

Professional Development

10 Qs

css_quiz_10.08.10

css_quiz_10.08.10

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

NEHA GUPTA

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The word X is a combination of the words “robot” and “network”. It is a number of Internet-connected devices, each of which is running one or more bots. This can be used to perform DDoS attacks, steal data, send spam. Identify the word X?

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

X has been defined as “any act that influences a person to take an action that may or may not be in their best interests.”. Basically, it is the psychological manipulation of people into performing actions or divulging confidential information. What is X?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If DoS – Denial of Service

What is DDoS?

Distributed Denial of Service

Denial Distributed of Service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

X is an algorithm on a computer system that bypasses security controls. Generally, this is added by the original developer for some legitimate access, which may also be used by a hacker in a malicious way. What is this form of vulnerability called?

Backdoor

Spoofing

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What does the acronym VIRUS stand for?

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What was created to sabotage Iran’s nuclear program?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method of hacking will record all your keystrokes?

a) Keyhijacking

b) Keyjacking

c) Keylogging

d) Keyboard monitoring

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?