Basic Introduction Of hacking

Basic Introduction Of hacking

Professional Development

10 Qs

quiz-placeholder

Similar activities

Apti_1_Distance & Time, Problems on Train

Apti_1_Distance & Time, Problems on Train

Professional Development

10 Qs

Cloud computing

Cloud computing

Professional Development

10 Qs

Atomic structure

Atomic structure

KG - Professional Development

10 Qs

HAMMER THROW

HAMMER THROW

4th Grade - Professional Development

10 Qs

Initial Assessment - Cybersecurity Awareness

Initial Assessment - Cybersecurity Awareness

9th Grade - Professional Development

10 Qs

Adultes A1 Beginners

Adultes A1 Beginners

Professional Development

15 Qs

Group A_Danone

Group A_Danone

University - Professional Development

10 Qs

Cycle 4: Session 8 Review.

Cycle 4: Session 8 Review.

Professional Development

12 Qs

Basic Introduction Of hacking

Basic Introduction Of hacking

Assessment

Quiz

Education, Computers

Professional Development

Practice Problem

Hard

Created by

Lovely Parrot

Used 94+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When paying for products online it is best ot check the website starts with the protocol HTTPS and shows a

padlock.

What is this known as ?

Security lab

Encryption

Firewall

Secure Socket Layer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a password that consists of combination of latter, both uppercase and lowercase, numbers and symbol is known as which of the following ?

Secure Password

Solid Password

Keylogger Password

Trojan Password

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hackers who engage in hacking for illeagal purposes are known as which of the following ?

Red hat hacker

Black hat hacker

Blue hat hacker

White hat hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is the name of the software that is designed to record every action which is typed with the aim of stealing sensitive data?

Trojan horse

Worm

Keylogger

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the trojan horse ?

A virus that replicate itself through computer networks

A virus that block devices access until money is paid

A program that will remember your account details, such as name and login details the next time you visit a wesite

Software the pretends to be a useful program but is actually carrying out hidden, harmful activity.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does GDPR stand for ?

Great Danes Performance Ratings

General data Protection Records

General Disclosure Protection Regulations

General Data Protection Regulation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Purpose anti-virus software ?

To make chocolate

To prevent hackers form accessing the network

To block unauthorised connection to the network

To Prevent a virus from attacking the network

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?