MOBILE VULNERABILITIES

MOBILE VULNERABILITIES

1st Grade

11 Qs

quiz-placeholder

Similar activities

EXCEL 10 класс

EXCEL 10 класс

1st Grade

10 Qs

CHAPTER 2 - ITN

CHAPTER 2 - ITN

1st Grade

10 Qs

G7 - Ôn tập C1,2

G7 - Ôn tập C1,2

KG - University

10 Qs

Microsoft Word Basic

Microsoft Word Basic

1st - 5th Grade

10 Qs

Software dan hadware

Software dan hadware

1st Grade

16 Qs

class 2 Keyboard

class 2 Keyboard

1st - 3rd Grade

15 Qs

S3 Computing Security Quiz

S3 Computing Security Quiz

KG - University

10 Qs

Grade 1 COMPUTER MOUSE UNIT TEST 4

Grade 1 COMPUTER MOUSE UNIT TEST 4

1st Grade

14 Qs

MOBILE VULNERABILITIES

MOBILE VULNERABILITIES

Assessment

Quiz

Computers

1st Grade

Hard

Created by

Shafinaz Fauzi

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Impersonates an authorized device or user to steal data, spread malware, or bypass access control systems.

A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

After gaining access to a system, the attacker takes malicious software and acts against the interests of the computer user

A target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?

Impersonates an authorized device or user to steal data, spread malware, or bypass access control systems.

A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

After gaining access to a system, the attacker takes malicious software and acts against the interests of the computer user

A target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Cross-site scripting (xss)?

Impersonates an authorized device or user to steal data, spread malware, or bypass access control systems.

A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

After gaining access to a system, the attacker takes malicious software and acts against the interests of the computer user

A target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Wireless Spoofing?

Impersonates an authorized device or user to steal data, spread malware, or bypass access control systems.

A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

After gaining access to a system, the attacker takes malicious software and acts against the interests of the computer user

A target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the types of attack?

DDoS

Man-in-the-middle

Adware

Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the types of attack?

DoS

Man-in-the-middle

Adware

Spyware

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How to defend DDoS attacks?

(Choose 3)

Fight application-layer attacks in-line

Only watch data breach

Collaborate

Watch out for secondary attacks

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?