Unit II. Security Threats. Автор учебника: Д.В. Записной

Unit II. Security Threats. Автор учебника: Д.В. Записной

Professional Development

35 Qs

quiz-placeholder

Similar activities

Database Questions

Database Questions

KG - Professional Development

31 Qs

TS Final

TS Final

Professional Development

31 Qs

2nd Quarter Security Training Quiz

2nd Quarter Security Training Quiz

Professional Development

40 Qs

Marcaria test 1

Marcaria test 1

Professional Development

40 Qs

Comp_Sec_421-450

Comp_Sec_421-450

Professional Development

30 Qs

COMPUTER TERM II

COMPUTER TERM II

Professional Development

30 Qs

UT 1. Hardware y Software

UT 1. Hardware y Software

Professional Development

33 Qs

MileStone-2

MileStone-2

Professional Development

30 Qs

Unit II. Security Threats. Автор учебника: Д.В. Записной

Unit II. Security Threats. Автор учебника: Д.В. Записной

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Православный Панк

Used 8+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Do you mean people have to pay attackers to _____ their computers work?

pay

recover

avoid

study

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Are you going to _____ such a great amount of journals tonight?

recover

avoid

pay

study

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Actually, ransomware perpetrators typically _____ demanding huge sums of money.

avoid

study

recover

pay

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common opinion of people who have to _____ ransoms?

avoid

recover

pay

study

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____ – ПО пути обхода системы защиты

Trojan horse

backdoor

rootkit

logic bomb

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____ – позволяет хакеру закрепиться во взломанной системе и скрыть следы своей деятельности

Trojan horse

logic bomb

backdoor

rootkit

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____ – код, вызывающий выполнение деструктивных действий при совпадении некоторых условий

logic bomb

backdoor

rootkit

Trojan horse

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?