Cybersecurity Chapter 1 to 3 summary

Cybersecurity Chapter 1 to 3 summary

11th Grade

30 Qs

quiz-placeholder

Similar activities

cybersecurity worksheet

cybersecurity worksheet

9th Grade - University

29 Qs

BCA - Digital Literacy 4

BCA - Digital Literacy 4

10th - 12th Grade

30 Qs

Cyber security

Cyber security

11th Grade

26 Qs

External threats

External threats

KG - Professional Development

26 Qs

Year 9 pre-exam review May 2024

Year 9 pre-exam review May 2024

9th - 12th Grade

25 Qs

E-Security

E-Security

11th Grade - University

31 Qs

Teknologi Informasi dan Komunikasi

Teknologi Informasi dan Komunikasi

10th - 12th Grade

25 Qs

Cybersecurity: Ch 3 & 4

Cybersecurity: Ch 3 & 4

9th - 12th Grade

25 Qs

Cybersecurity Chapter 1 to 3 summary

Cybersecurity Chapter 1 to 3 summary

Assessment

Quiz

Computers

11th Grade

Hard

Created by

E Sheng Toh

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to hackers who hack for a cause?

hactivist

white hat

blue hat

hacker

Answer explanation

The term is used to describe gray hackers who rally and protect for a cause.

The correct answer is: hactivist

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT

algorithm

DDoS

exhaustion

Answer explanation

Algorithm attacks can force computers to use memory or overwork the CPU.

The correct answer is: algorithm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term BYOD represent?

bring your own device

bring your own disaster

bring your own decision

buy your own disaster

Answer explanation

The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices,

The correct answer is: bring your own device

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a amateur hacker?

blue team

red hat

script kiddie

black hat

Answer explanation

Script kiddies is a term used to describe inexperienced hackers.

The correct answer is: script kiddie

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an Internet data domain?

Cisco

Linkedin

Palo Alto

Juniper

Answer explanation

A data domain is a repository for data.

The correct answer is: Linkedin

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

ping sweep

DDoS

DoS

spoof

Answer explanation

DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

The correct answer is: DDoS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service determines which resources a user can access along with the operations that a user can perform?

authorization

authentication

accounting

biometric

Answer explanation

Authorization determines whether a user has certain access privileges.

The correct answer is: authorization

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?