Pahirap sa buhay

Pahirap sa buhay

University

53 Qs

quiz-placeholder

Similar activities

Berpikir Komputasi

Berpikir Komputasi

University

50 Qs

Modules 1-2

Modules 1-2

University

53 Qs

Introduction to Computer

Introduction to Computer

University

50 Qs

NILAI KUIS PERTAMA

NILAI KUIS PERTAMA

University - Professional Development

50 Qs

ict 1-50

ict 1-50

University

50 Qs

ICT 151-200

ICT 151-200

University

50 Qs

SUMATIF AKHIR SEMESTER KELAS VII

SUMATIF AKHIR SEMESTER KELAS VII

7th Grade - University

50 Qs

PHP Basics

PHP Basics

University

54 Qs

Pahirap sa buhay

Pahirap sa buhay

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

JANZELLE ANN MISMANOS

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

53 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

ping sweep

DDoS

DoS

spoof

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a method of attack to exploit a target

a computer that contains sensitive information

a known target or victim machine

a weakness that makes a target susceptible to an attack

a potential threat that a hacker creates

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Oversight and Development

Protect and Defend

Analyze

Securely Provision

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The warting cyber criminals includes which of the following? (Choose two.)

sharing cyber Intelligence information

hiring hackers

establishing early warning systems

shutting down the network

changing operating systems

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

exhaustion

DDoS

algorithm

APT

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

employment

education

food

game

medical

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a amateur hacker?

blue team

red hat

black hat

script kiddie

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?