COMPUTER ATTACKS

COMPUTER ATTACKS

University

16 Qs

quiz-placeholder

Similar activities

Kuis tentang strategi pencarian informasi ilmiah

Kuis tentang strategi pencarian informasi ilmiah

University

15 Qs

Cyber Hygiene

Cyber Hygiene

University

15 Qs

Day 5

Day 5

University

19 Qs

HIPPA Overview

HIPPA Overview

University

13 Qs

Cyber

Cyber

University

20 Qs

penyusunan e modul

penyusunan e modul

KG - Professional Development

15 Qs

Minecraft Pocket Edition

Minecraft Pocket Edition

KG - Professional Development

11 Qs

Chapter 1

Chapter 1

University

12 Qs

COMPUTER ATTACKS

COMPUTER ATTACKS

Assessment

Quiz

Other

University

Medium

Created by

nazatul hamizi

Used 3+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many steps that criminals use to attack information system:

6 steps
5 steps
7 steps
10 steps

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are 6 steps that criminals use to attack information system:

conduct reconnaissance,

attempt social engineering,

scan the target, research,

execute target, cover tracks

attempt social engineering, conduct reconnaissance, scan target, research, cover tracks, execute target

conduct reconnaissance, scan the target, attempt social engineering, research, execute target, cover tracks

attempt social engineering, conduct reconnaissance, scan target, research, cover tracks, execute target

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Botnets are used to perform a which is designed to make a resource unavailable to its users.


brute force attack

dictionary attack

zero-day attack

denial of service attack

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Botnet also known as .

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the best defense against brute force attack ?

adware

patch

keylogger

monitoring system activity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Password cracking can used to help users recover forgotten password and to generate user ID.


TRUE

FALSE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of trial-and error method in brute force attack?

Guessing the password and user ID

Using a dictionary of common passwords
Using a random password generator

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?