Unit II. Security Threats. Автор учебника: Д.В. Записной

Unit II. Security Threats. Автор учебника: Д.В. Записной

Professional Development

35 Qs

quiz-placeholder

Similar activities

Quiz 4 - PROFE5 313 - Final

Quiz 4 - PROFE5 313 - Final

Professional Development

30 Qs

Quiz 2 - PROFE5 313 - Final

Quiz 2 - PROFE5 313 - Final

Professional Development

30 Qs

SCOR Quizizz Questions

SCOR Quizizz Questions

Professional Development

30 Qs

Quiz 4 - ITEDEV - Final

Quiz 4 - ITEDEV - Final

Professional Development

30 Qs

M1 R5 MCQ (test 9)

M1 R5 MCQ (test 9)

Professional Development

30 Qs

hashing

hashing

Professional Development

30 Qs

OS, Virtualization, Authentication, information security

OS, Virtualization, Authentication, information security

Professional Development

30 Qs

Office Procedures Petty Cash, Stock Control Misc Questions

Office Procedures Petty Cash, Stock Control Misc Questions

10th Grade - Professional Development

32 Qs

Unit II. Security Threats. Автор учебника: Д.В. Записной

Unit II. Security Threats. Автор учебника: Д.В. Записной

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Православный Панк

Used 8+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Do you mean people have to pay attackers to _____ their computers work?

pay

recover

avoid

study

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Are you going to _____ such a great amount of journals tonight?

recover

avoid

pay

study

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Actually, ransomware perpetrators typically _____ demanding huge sums of money.

avoid

study

recover

pay

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common opinion of people who have to _____ ransoms?

avoid

recover

pay

study

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____ – ПО пути обхода системы защиты

Trojan horse

backdoor

rootkit

logic bomb

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____ – позволяет хакеру закрепиться во взломанной системе и скрыть следы своей деятельности

Trojan horse

logic bomb

backdoor

rootkit

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____ – код, вызывающий выполнение деструктивных действий при совпадении некоторых условий

logic bomb

backdoor

rootkit

Trojan horse

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?