COMPUTER ATTACKS

COMPUTER ATTACKS

University

16 Qs

quiz-placeholder

Similar activities

EDAN

EDAN

University

15 Qs

Cinefilos

Cinefilos

KG - Professional Development

20 Qs

Quiz 1 - LKM STIE IPWIJA 2020

Quiz 1 - LKM STIE IPWIJA 2020

University

20 Qs

Chapter 5: Industry and Competitor Analysis(L6)

Chapter 5: Industry and Competitor Analysis(L6)

University

15 Qs

Chapter 13 Initial Coin Offering (ICO)

Chapter 13 Initial Coin Offering (ICO)

University

20 Qs

Focused Assessment- Respiratory

Focused Assessment- Respiratory

University

15 Qs

Sosialisasi Pasar Modal

Sosialisasi Pasar Modal

University

15 Qs

Pasar Modal Syariah bersama MOST Syariah

Pasar Modal Syariah bersama MOST Syariah

University

20 Qs

COMPUTER ATTACKS

COMPUTER ATTACKS

Assessment

Quiz

Other

University

Practice Problem

Medium

Created by

nazatul hamizi

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many steps that criminals use to attack information system:

6 steps
5 steps
7 steps
10 steps

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are 6 steps that criminals use to attack information system:

conduct reconnaissance,

attempt social engineering,

scan the target, research,

execute target, cover tracks

attempt social engineering, conduct reconnaissance, scan target, research, cover tracks, execute target

conduct reconnaissance, scan the target, attempt social engineering, research, execute target, cover tracks

attempt social engineering, conduct reconnaissance, scan target, research, cover tracks, execute target

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Botnets are used to perform a which is designed to make a resource unavailable to its users.


brute force attack

dictionary attack

zero-day attack

denial of service attack

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Botnet also known as .

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the best defense against brute force attack ?

adware

patch

keylogger

monitoring system activity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Password cracking can used to help users recover forgotten password and to generate user ID.


TRUE

FALSE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of trial-and error method in brute force attack?

Guessing the password and user ID

Using a dictionary of common passwords
Using a random password generator

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?