
Security Basics & IT Profesionals (Chapter 1)
Authored by Firdaus Awang
Computers
4th Grade
Used 175+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the CORRECT goals of security.
Impudently, Integrity & Availability
Confidentiality, Smart & Availability
Confidentiality, Integrity & Availability
Confidentiality, Integrity & accessibility
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the CORRECT type of attack to computer security.
Physical Attack
Mentally Attack
Software Attack
Hardware Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Indentify the INCORRECT method of Security Attack.
Hacker
Reconnaissance Attack
Denial of Service Attack (DOS)
Malicious
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the INCORRECT source of security threat.
Unstructured
Structured
External and Internal
Malicious
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify THE TYPES of hacker.
Black Hats
Professionals
Pink Hats
Elite
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Recognize the BEST definition of Unstructured Security Threat.
Hackers can understand and develop exploit code and scripts.
Hackers understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses.
Hackers know system vulnerabilities
Testing and challenging a hacker’s skills.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify the CORRECT criteria of hackers.
A person who breaks into other people's computers with malicious intentions.
Such a person explorer computer and networks to discover his capabilities. He is a malicious intruder, thus, who tries to discover information by gaining unauthorized access.
Not only viruses, he or she may write other harmful programs that affect the working of network or create damages in your system.
When there is some kind of restricted access, this person may try to find ways around the protection, such as a rear door or loading dock that has poor security, or tail-gating somebody through a security badge reader controlled door, using fake credentials, etc.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?