COMPUTER ATTACKS

COMPUTER ATTACKS

University

16 Qs

quiz-placeholder

Similar activities

INTERNET

INTERNET

University

20 Qs

KUIS MATA KULIAH ENTREPRENEURSHIP - MANAJEMEN 2022

KUIS MATA KULIAH ENTREPRENEURSHIP - MANAJEMEN 2022

University

20 Qs

UTS Hukum Perdata

UTS Hukum Perdata

University

20 Qs

Digital Marketing - Organic Marketing

Digital Marketing - Organic Marketing

University

20 Qs

QUIZ MSKI KPPN TEGAL

QUIZ MSKI KPPN TEGAL

6th Grade - University

13 Qs

Pengelolaan Asuransi_BIP CS Unit

Pengelolaan Asuransi_BIP CS Unit

University

18 Qs

DCE 2232_QUIZ 2_CHAPTER 5

DCE 2232_QUIZ 2_CHAPTER 5

University

20 Qs

First Aid Quiz

First Aid Quiz

9th Grade - University

15 Qs

COMPUTER ATTACKS

COMPUTER ATTACKS

Assessment

Quiz

Other

University

Practice Problem

Medium

Created by

nazatul hamizi

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many steps that criminals use to attack information system:

6 steps
5 steps
7 steps
10 steps

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are 6 steps that criminals use to attack information system:

conduct reconnaissance,

attempt social engineering,

scan the target, research,

execute target, cover tracks

attempt social engineering, conduct reconnaissance, scan target, research, cover tracks, execute target

conduct reconnaissance, scan the target, attempt social engineering, research, execute target, cover tracks

attempt social engineering, conduct reconnaissance, scan target, research, cover tracks, execute target

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Botnets are used to perform a which is designed to make a resource unavailable to its users.


brute force attack

dictionary attack

zero-day attack

denial of service attack

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Botnet also known as .

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the best defense against brute force attack ?

adware

patch

keylogger

monitoring system activity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Password cracking can used to help users recover forgotten password and to generate user ID.


TRUE

FALSE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of trial-and error method in brute force attack?

Guessing the password and user ID

Using a dictionary of common passwords
Using a random password generator

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?