NETWORK SECURITY

NETWORK SECURITY

University

20 Qs

quiz-placeholder

Similar activities

Computer S/w

Computer S/w

10th Grade - University

16 Qs

L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

University

15 Qs

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade - University

19 Qs

Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

University

20 Qs

Computer Science (1-9) - System software & Security

Computer Science (1-9) - System software & Security

University

17 Qs

IAS Quiz 1

IAS Quiz 1

University

16 Qs

CSC098 - Kuiz Chapter 12

CSC098 - Kuiz Chapter 12

University

23 Qs

Chapter 10: Security

Chapter 10: Security

11th Grade - University

25 Qs

NETWORK SECURITY

NETWORK SECURITY

Assessment

Quiz

Computers

University

Medium

Created by

MORIES GUINTO

Used 26+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The unauthorized discovery and mapping of systems, services, or vulnerabilities.

Reconnaissance

Access

Denial of service

Worms, viruses, and Trojan horses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ability for an intruder to gain access to a device for which the intruder does not have an account or a password.

reconnaissance

access

denial of service

worms, viruses & trojan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Involve either crashing the system or slowing it down to the point that it is unusable.

reconnaissance

access

denial of service

worms, viruses & trojan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that can be inserted onto a host to damage or corrupt a system, replicate itself, or deny access to networks, systems, or services.

reconnaissance

access

denial of service

worms, viruses & trojan

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Come from individuals or groups that are more highly motivated and technically competent.

structured

unstructured

external

internal

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mostly inexperienced individuals using easily available hacking tools, such as shell scripts and password crackers

structured

unstructured

external

internal

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Come from someone who has authorized access to the network with either an account or physical access.

structured

unstructured

external

internal

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?