css_quiz_10.08.10

css_quiz_10.08.10

Professional Development

10 Qs

quiz-placeholder

Similar activities

CCNA Security IINS Chapter 1 Quiz

CCNA Security IINS Chapter 1 Quiz

Professional Development

10 Qs

Computer Threats

Computer Threats

KG - Professional Development

8 Qs

Networking

Networking

Professional Development

10 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

Denial of Service

Denial of Service

Professional Development

15 Qs

Basics of Cybersecurity

Basics of Cybersecurity

Professional Development

15 Qs

OSI Security Architecture

OSI Security Architecture

Professional Development

10 Qs

Windows Updates

Windows Updates

9th Grade - Professional Development

8 Qs

css_quiz_10.08.10

css_quiz_10.08.10

Assessment

Quiz

Computers

Professional Development

Medium

Created by

NEHA GUPTA

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The word X is a combination of the words “robot” and “network”. It is a number of Internet-connected devices, each of which is running one or more bots. This can be used to perform DDoS attacks, steal data, send spam. Identify the word X?

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

X has been defined as “any act that influences a person to take an action that may or may not be in their best interests.”. Basically, it is the psychological manipulation of people into performing actions or divulging confidential information. What is X?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If DoS – Denial of Service

What is DDoS?

Distributed Denial of Service

Denial Distributed of Service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

X is an algorithm on a computer system that bypasses security controls. Generally, this is added by the original developer for some legitimate access, which may also be used by a hacker in a malicious way. What is this form of vulnerability called?

Backdoor

Spoofing

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What does the acronym VIRUS stand for?

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What was created to sabotage Iran’s nuclear program?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method of hacking will record all your keystrokes?

a) Keyhijacking

b) Keyjacking

c) Keylogging

d) Keyboard monitoring

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?