css_quiz_10.08.10

css_quiz_10.08.10

Professional Development

10 Qs

quiz-placeholder

Similar activities

RE-ECHO ON TECHNOLOGY LITERACY AND SKILLS

RE-ECHO ON TECHNOLOGY LITERACY AND SKILLS

Professional Development

10 Qs

ETEC 411 Computer Hardware & Software Quiz

ETEC 411 Computer Hardware & Software Quiz

9th Grade - Professional Development

11 Qs

USE OF ICT IN THE LEARNING PROCESS

USE OF ICT IN THE LEARNING PROCESS

Professional Development

10 Qs

Mobile Technology

Mobile Technology

Professional Development

10 Qs

python quiz

python quiz

6th Grade - Professional Development

10 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

ISC2 - Chapter 1 - Module 3 - G2

ISC2 - Chapter 1 - Module 3 - G2

Professional Development

13 Qs

Java Server Page

Java Server Page

Professional Development

10 Qs

css_quiz_10.08.10

css_quiz_10.08.10

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

NEHA GUPTA

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The word X is a combination of the words “robot” and “network”. It is a number of Internet-connected devices, each of which is running one or more bots. This can be used to perform DDoS attacks, steal data, send spam. Identify the word X?

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

X has been defined as “any act that influences a person to take an action that may or may not be in their best interests.”. Basically, it is the psychological manipulation of people into performing actions or divulging confidential information. What is X?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If DoS – Denial of Service

What is DDoS?

Distributed Denial of Service

Denial Distributed of Service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

X is an algorithm on a computer system that bypasses security controls. Generally, this is added by the original developer for some legitimate access, which may also be used by a hacker in a malicious way. What is this form of vulnerability called?

Backdoor

Spoofing

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What does the acronym VIRUS stand for?

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What was created to sabotage Iran’s nuclear program?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method of hacking will record all your keystrokes?

a) Keyhijacking

b) Keyjacking

c) Keylogging

d) Keyboard monitoring

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?