
Information Security Threats & Policies in Europe
Authored by 曾子寧 曾子寧
Computers
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Please select 3 cyberattacks on Estonia
DDoS
Ping to Death
Ransomware
Spam Flooding
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is true about conficker worm?
An insect that eat computers.
A worm that makes you sick.
It will damage your computer.
It's an antivirus software.
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which is the target of conficker worm?
Government
Military Agency
Enterprise
All of the above
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Can hackers hack into your computer system via USB?
Yes
No
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which kind of cyberattack is using a large amount of requests to overload the system?
Conficker worm
Distributed denial-of-service (DDoS)
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which country was Petya malware's target?
Taiwan
Japan
Ukraine
Korea
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the European Commision NOT do?
Managing EU policies and allocates EU
Enforcing England's law
Representation of EU
Appointing the president of EU
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?