Security Basics & IT Profesionals (Chapter 1)

Security Basics & IT Profesionals (Chapter 1)

4th Grade

20 Qs

quiz-placeholder

Similar activities

EVOLUTION OF COMPUTERS

EVOLUTION OF COMPUTERS

4th - 8th Grade

16 Qs

The Keyboard

The Keyboard

2nd - 4th Grade

17 Qs

Python Basics

Python Basics

KG - University

16 Qs

Алгоритмы на языке Паскаль

Алгоритмы на языке Паскаль

1st - 5th Grade

17 Qs

Quiz on ICT class V

Quiz on ICT class V

KG - 5th Grade

20 Qs

Year 7 - Just for fun

Year 7 - Just for fun

4th - 5th Grade

15 Qs

OCR Cloud Technologies LO3

OCR Cloud Technologies LO3

1st - 5th Grade

15 Qs

Security Basics & IT Profesionals (Chapter 1)

Security Basics & IT Profesionals (Chapter 1)

Assessment

Quiz

Computers

4th Grade

Practice Problem

Hard

Created by

Firdaus Awang

Used 175+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the CORRECT goals of security.

Impudently, Integrity & Availability

Confidentiality, Smart & Availability

Confidentiality, Integrity & Availability

Confidentiality, Integrity & accessibility

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the CORRECT type of attack to computer security.

Physical Attack

Mentally Attack

Software Attack

Hardware Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Indentify the INCORRECT method of Security Attack.

Hacker

Reconnaissance Attack

Denial of Service Attack (DOS)

Malicious

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the INCORRECT source of security threat.

Unstructured

Structured

External and Internal

Malicious

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify THE TYPES of hacker.

Black Hats

Professionals

Pink Hats

Elite

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Recognize the BEST definition of Unstructured Security Threat.

Hackers can understand and develop exploit code and scripts.

Hackers understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses.

Hackers know system vulnerabilities

Testing and challenging a hacker’s skills.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the CORRECT criteria of hackers.

A person who breaks into other people's computers with malicious intentions.

Such a person explorer computer and networks to discover his capabilities. He is a malicious intruder, thus, who tries to discover information by gaining unauthorized access.

Not only viruses, he or she may write other harmful programs that affect the working of network or create damages in your system.

When there is some kind of restricted access, this person may try to find ways around the protection, such as a rear door or loading dock that has poor security, or tail-gating somebody through a security badge reader controlled door, using fake credentials, etc.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?