
Methods of Attack
Authored by Alexander Woolston
Computers
KG - University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
method of breaching network security without knowledge of programming
Phishing
Social Engineering
Hacking
Cheating
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tries to get a victim to divulge information by asking them for it!
Blagging
Phishing
Hacking
Social Engineering
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Frauders send emails claiming to be someone else to gain your personal & financial details
Emailing
Phishing
Blagging
Hacking
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where you look over someone’s shoulder to gain information
Shouldering
Being nosey
Hacking
Social Engineering
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
DDOS stands for
Distributed Denial of Sales
Dynamic Denial of Sales
Deadly Denial of Service
Distributed Denial of Service
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What comes under attack in a DDOS attack?
The web server
The user
The hacker
The government
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How will a DDOS attack affect a legitimate user?
Their data might be stolen
They will experience hacking.
They will experience slow speeds.
They will have to pay to get the website fixed
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?