
computer attacks and abuse
Quiz
•
Education
•
University
•
Practice Problem
•
Medium
NURUL ZULKEPLI
Used 5+ times
FREE Resource
Enhance your content in a minute
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Dictionary attacks is software that generates user ID and password guesses using a dictionary of possible user IDs and passwords to reduce the number of guesses required.
Hackers will send ____ to company and use dictionary attacks to guess e-mail addresses.
Spam e-mail
blank e-mail
Phishing attack
Short message service
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cross-site scripting (XSS) is a vulnerability in dynamic web pages that allows an attacker to bypass a browser's _______mechanisms and _______ the victim's browser to execute code, thinking it came from the desired website.
Security / instruct
Extreme / order
Annual / hide
Common / deceive
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spamming is
solely sending the same solicited message to one person at specific time, often in an attempt to sell something.
making an electronic communication look as if someone else sent it to gain the trust of the recipient.
reuses usernames and passwords from other data breaches to try to break into other systems
simultaneously sending the same unsolicited message to many people at the same time, often in an attempt to sell something.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hacking is
Unauthorized access, modification or used of an electronic device or some element of a computer system
manipulating clicks numbers to inflate advertising bills.
internet to spread false or misleading information
gaining control of a computer to carry out illicit activities without user’s knowledge.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Australia, a woman got a call asking why she had sent the caller multiple adult message texts every day for the past few months. Neither she nor her mobile company could explain the texts, as her account showed that they were not coming from her phone. When she realized there was no way of blocking the messages, she changed her mobile number to avoid any further embarrassment by association.
WHAT FORM OF SPOOFING INVOLVE
E-mail spoofing
caller ID spoofing
SMS spoofing
IP address spoofing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
____ exchanging sexually explicit text messages and revealing pictures, usually by means of phone. Posting or sharing these pictures and messages with people who were never intended to see or read them.
Cyber-bullying
Sexting
E-mail threats
Spamming
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hijacking is gaining control of a computer to carry out ____, such as sending spam without the computer user’s knowledge.
hijack activities
illicit activities
botnet
bot herder
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
VCS quiz 1
Quiz
•
University
13 questions
CA 05
Quiz
•
3rd Grade - University
15 questions
QUIZ 3 : TOPIC 11 [INCOMPLETE RECORDS & SINGLE ENTRY]
Quiz
•
1st Grade - University
10 questions
epithelium
Quiz
•
University
15 questions
Primary or secondary sources RES120
Quiz
•
University
10 questions
5. THẦY TRƯỜNG CHINH - GDQP - HP1 - BÀI 5
Quiz
•
University
10 questions
Service Marketing
Quiz
•
University
10 questions
Quiz IAS 16
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
