Unit II. Security Threats. Автор учебника: Д.В. Записной

Unit II. Security Threats. Автор учебника: Д.В. Записной

Professional Development

35 Qs

quiz-placeholder

Similar activities

Pretest BR2 TPAD

Pretest BR2 TPAD

Professional Development

30 Qs

PAM, FortiRecon, Email Security, Workspace Security, WAF

PAM, FortiRecon, Email Security, Workspace Security, WAF

Professional Development

30 Qs

FPL - TATA - Product Knowledge - Altroz

FPL - TATA - Product Knowledge - Altroz

Professional Development

30 Qs

Healthcare Laws and Ethics Quiz

Healthcare Laws and Ethics Quiz

Professional Development

40 Qs

Quick Books Quiz

Quick Books Quiz

Professional Development

30 Qs

12. EC  Language Development

12. EC Language Development

Professional Development

39 Qs

P) Advanced Driver Assist Systems (ADAS)

P) Advanced Driver Assist Systems (ADAS)

Professional Development

31 Qs

Persiapan Olimpiade PSIAP II

Persiapan Olimpiade PSIAP II

Professional Development

30 Qs

Unit II. Security Threats. Автор учебника: Д.В. Записной

Unit II. Security Threats. Автор учебника: Д.В. Записной

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Medium

Created by

Православный Панк

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Do you mean people have to pay attackers to _____ their computers work?

pay

recover

avoid

study

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Are you going to _____ such a great amount of journals tonight?

recover

avoid

pay

study

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Actually, ransomware perpetrators typically _____ demanding huge sums of money.

avoid

study

recover

pay

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common opinion of people who have to _____ ransoms?

avoid

recover

pay

study

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____ – ПО пути обхода системы защиты

Trojan horse

backdoor

rootkit

logic bomb

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____ – позволяет хакеру закрепиться во взломанной системе и скрыть следы своей деятельности

Trojan horse

logic bomb

backdoor

rootkit

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____ – код, вызывающий выполнение деструктивных действий при совпадении некоторых условий

logic bomb

backdoor

rootkit

Trojan horse

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?