Security Basics & IT Profesionals (Chapter 1)
Quiz
•
Computers
•
4th Grade
•
Practice Problem
•
Hard
Firdaus Awang
Used 175+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the CORRECT goals of security.
Impudently, Integrity & Availability
Confidentiality, Smart & Availability
Confidentiality, Integrity & Availability
Confidentiality, Integrity & accessibility
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the CORRECT type of attack to computer security.
Physical Attack
Mentally Attack
Software Attack
Hardware Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Indentify the INCORRECT method of Security Attack.
Hacker
Reconnaissance Attack
Denial of Service Attack (DOS)
Malicious
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the INCORRECT source of security threat.
Unstructured
Structured
External and Internal
Malicious
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify THE TYPES of hacker.
Black Hats
Professionals
Pink Hats
Elite
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Recognize the BEST definition of Unstructured Security Threat.
Hackers can understand and develop exploit code and scripts.
Hackers understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses.
Hackers know system vulnerabilities
Testing and challenging a hacker’s skills.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify the CORRECT criteria of hackers.
A person who breaks into other people's computers with malicious intentions.
Such a person explorer computer and networks to discover his capabilities. He is a malicious intruder, thus, who tries to discover information by gaining unauthorized access.
Not only viruses, he or she may write other harmful programs that affect the working of network or create damages in your system.
When there is some kind of restricted access, this person may try to find ways around the protection, such as a rear door or loading dock that has poor security, or tail-gating somebody through a security badge reader controlled door, using fake credentials, etc.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
19 questions
Gmail & SCRATCH
Quiz
•
2nd - 4th Grade
20 questions
Colour Theory
Quiz
•
3rd Grade - University
15 questions
Y10 BTEC DIT Knowledge Checkpoint 1
Quiz
•
4th Grade
15 questions
IT PRE TEST / POST TEST
Quiz
•
3rd - 8th Grade
16 questions
Informatyka 6
Quiz
•
4th - 8th Grade
20 questions
Ms Word Class 3
Quiz
•
3rd - 5th Grade
20 questions
Operating System
Quiz
•
3rd - 4th Grade
19 questions
G4 - Email - Basic + Format text + Send
Quiz
•
4th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
