
Cyber Security Essentials (1) TKJ 1
Authored by Aditia Bawang
Other
3rd Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 10 pts
Apa nama yang diberikan kepada peretas yang meretas untuk suatu tujuan?
Topi Biru
Topi Putih
Hactivist
Hacker
2.
MULTIPLE CHOICE QUESTION
20 sec • 10 pts
Usaha untuk merusak system pada jaringan, seperti Trojanhorse, Logicbom, Trapdoor, Virus, Worm dan Zombie disebut….
Theft
Destruction
Fraud
Denial
3.
MULTIPLE CHOICE QUESTION
20 sec • 10 pts
Apa nama yang diberikan kepada peretas amatir?
red hat
black hat
script kiddie
blue team
4.
MULTIPLE CHOICE QUESTION
20 sec • 10 pts
Suatu aktivitas menganalisis jaringan untuk mengetahui bagian dari sistem yang cenderung untuk diserang disebut….
Vulnerability
Impact
Threat
Recommended countermeasures
5.
MULTIPLE CHOICE QUESTION
20 sec • 10 pts
Program yang menyebabkan kerusakan sistem ketika dijalankan disebut….
Packet Snifer
Denial-of-Service
Phishing
Malicious code
6.
MULTIPLE CHOICE QUESTION
20 sec • 10 pts
Apa contoh domain data Internet?
Juniper
Palo Alto
Cisco
7.
MULTIPLE CHOICE QUESTION
20 sec • 10 pts
Yang bukan penyebab cracker melakukan penyerangan adalah….
Availability
Spite
Sport
Curiosity
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?