Security Basics & IT Profesionals (Chapter 1)
Quiz
•
Computers
•
4th Grade
•
Practice Problem
•
Hard
Firdaus Awang
Used 175+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the CORRECT goals of security.
Impudently, Integrity & Availability
Confidentiality, Smart & Availability
Confidentiality, Integrity & Availability
Confidentiality, Integrity & accessibility
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the CORRECT type of attack to computer security.
Physical Attack
Mentally Attack
Software Attack
Hardware Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Indentify the INCORRECT method of Security Attack.
Hacker
Reconnaissance Attack
Denial of Service Attack (DOS)
Malicious
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the INCORRECT source of security threat.
Unstructured
Structured
External and Internal
Malicious
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify THE TYPES of hacker.
Black Hats
Professionals
Pink Hats
Elite
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Recognize the BEST definition of Unstructured Security Threat.
Hackers can understand and develop exploit code and scripts.
Hackers understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses.
Hackers know system vulnerabilities
Testing and challenging a hacker’s skills.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify the CORRECT criteria of hackers.
A person who breaks into other people's computers with malicious intentions.
Such a person explorer computer and networks to discover his capabilities. He is a malicious intruder, thus, who tries to discover information by gaining unauthorized access.
Not only viruses, he or she may write other harmful programs that affect the working of network or create damages in your system.
When there is some kind of restricted access, this person may try to find ways around the protection, such as a rear door or loading dock that has poor security, or tail-gating somebody through a security badge reader controlled door, using fake credentials, etc.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Python Basics
Quiz
•
KG - University
17 questions
Алгоритмы на языке Паскаль
Quiz
•
1st - 5th Grade
20 questions
Computer History for kids
Quiz
•
3rd - 6th Grade
15 questions
Desktop Management for Grade 4
Quiz
•
4th Grade
18 questions
code.org Course C Lesson 6 Treasure with Laurel
Quiz
•
4th - 6th Grade
16 questions
Python Basics
Quiz
•
KG - University
16 questions
Basic Computer Vocabulary
Quiz
•
4th - 6th Grade
20 questions
Loops
Quiz
•
1st - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
