Search Header Logo

Information Security Threats & Policies in Europe

Authored by 曾子寧 曾子寧

Computers

University

Used 6+ times

Information Security Threats & Policies in Europe
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Please select 3 cyberattacks on Estonia

DDoS

Ping to Death

Ransomware

Spam Flooding

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which is true about conficker worm?

An insect that eat computers.

A worm that makes you sick.

It will damage your computer.

It's an antivirus software.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is the target of conficker worm?

Government

Military Agency

Enterprise

All of the above

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Can hackers hack into your computer system via USB?

Yes

No

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which kind of cyberattack is using a large amount of requests to overload the system?

Conficker worm

Distributed denial-of-service (DDoS)

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which country was Petya malware's target?

Taiwan

Japan

Ukraine

Korea

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What does the European Commision NOT do?

Managing EU policies and allocates EU

Enforcing England's law

Representation of EU

Appointing the president of EU

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?