
cybersecurity I
Authored by Pedro Martin
Computers
Professional Development
Used 17+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ransomware...
Erases all files in your computer
pops up images of cats on your screen
encrypts files in your computer and asks for money to decrypt them
changes your operative system's language and mocks you
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
I.O.T means...
Interweb of this
Internet on tanks
Internet over time
Internet of things
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Reconnaissance is a passive stage during an attack
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The first three phases of an attack in order are:
Scan, Recon, Exploit
Recon, Scan, Exploit
Exploit, Recon, Scan
Scan, Exploit, Recon
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
One of the most common O.S with lots of hacking tools is named
Kali
Hades
Shiva
Satan
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The framework developed by the MITRE Corporation to assign scores to vulnerabilities is
VCSS
VCE
CVE
CVSS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Regarding the evolution of hacking
First hackers were motivated by the money.
Last phase is where APTs appeared.
Insiders can only perform low complexity attacks.
Crackers from second phase only use zero day attacks.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?