MOBILE VULNERABILITIES

MOBILE VULNERABILITIES

1st Grade

11 Qs

quiz-placeholder

Similar activities

หน่วยที่ 2 - ระบบเครือข่ายและเทคโนโลยีสารสนเทศ

หน่วยที่ 2 - ระบบเครือข่ายและเทคโนโลยีสารสนเทศ

1st - 3rd Grade

10 Qs

Perkakasan dan Perisian Komputer

Perkakasan dan Perisian Komputer

1st - 4th Grade

7 Qs

Storage Devices

Storage Devices

1st - 3rd Grade

15 Qs

Quiz 1

Quiz 1

1st - 12th Grade

15 Qs

BÁO CAO

BÁO CAO

1st Grade

10 Qs

computer security

computer security

KG - 12th Grade

12 Qs

Cybersecurity Fundamentals Week 2 Quiz

Cybersecurity Fundamentals Week 2 Quiz

KG - University

10 Qs

Network Fundamental (DHCP)

Network Fundamental (DHCP)

1st - 3rd Grade

10 Qs

MOBILE VULNERABILITIES

MOBILE VULNERABILITIES

Assessment

Quiz

Computers

1st Grade

Hard

Created by

Shafinaz Fauzi

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Impersonates an authorized device or user to steal data, spread malware, or bypass access control systems.

A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

After gaining access to a system, the attacker takes malicious software and acts against the interests of the computer user

A target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?

Impersonates an authorized device or user to steal data, spread malware, or bypass access control systems.

A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

After gaining access to a system, the attacker takes malicious software and acts against the interests of the computer user

A target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Cross-site scripting (xss)?

Impersonates an authorized device or user to steal data, spread malware, or bypass access control systems.

A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

After gaining access to a system, the attacker takes malicious software and acts against the interests of the computer user

A target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Wireless Spoofing?

Impersonates an authorized device or user to steal data, spread malware, or bypass access control systems.

A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

After gaining access to a system, the attacker takes malicious software and acts against the interests of the computer user

A target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the types of attack?

DDoS

Man-in-the-middle

Adware

Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the types of attack?

DoS

Man-in-the-middle

Adware

Spyware

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How to defend DDoS attacks?

(Choose 3)

Fight application-layer attacks in-line

Only watch data breach

Collaborate

Watch out for secondary attacks

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?