
Unit II. Security Threats. Автор учебника: Д.В. Записной
Authored by Православный Панк
Professional Development
Professional Development
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Do you mean people have to pay attackers to _____ their computers work?
pay
recover
avoid
study
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Are you going to _____ such a great amount of journals tonight?
recover
avoid
pay
study
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Actually, ransomware perpetrators typically _____ demanding huge sums of money.
avoid
study
recover
pay
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the most common opinion of people who have to _____ ransoms?
avoid
recover
pay
study
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
_____ – ПО пути обхода системы защиты
Trojan horse
backdoor
rootkit
logic bomb
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
_____ – позволяет хакеру закрепиться во взломанной системе и скрыть следы своей деятельности
Trojan horse
logic bomb
backdoor
rootkit
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
_____ – код, вызывающий выполнение деструктивных действий при совпадении некоторых условий
logic bomb
backdoor
rootkit
Trojan horse
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?