Search Header Logo

Common Threats and Attacks

Authored by Nikolina Kasunić

Education

University

Used 2+ times

Common Threats and Attacks
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Malware koji djeluje pod krinkom legitimnog softvera nazivamo:

trojanski konj

virus

crv

logička bomba

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Zlonamjerni softver koji se samostalno umnaža i širi kroz mrežu nazivamo:

eng. spoofing

eng. backdoor

crv

virus

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Zlonamjerni kod koji iskorištava ranjivosti sustava kako bi mu kasnije mogao pristupati i upravljati udaljenim putem:

eng. rootkit

logička bomba

eng. malware

trojanski konj

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Vrsta napada prilikom koje se uskraćuje pristup resursu legitimnim korisnicima naziva se:

eng. recon

DoS

eng. access

DoD

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Vrstu napada prilikom kojeg napadač pregledava promet koji se razmijenjuje na mreži naziva se:

eng. spyware

eng. backdoor

eng. sniffing

eng. bot

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?