Search Header Logo

Untitled

Authored by Christopher Poquita

Computers

Untitled
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is often used prewritten hacking and cracking programs to break into computers.

Corporate spies

Hacker

Cracker

Script Kiddies

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of malware used by intruders to make their network or internet transmission appear legitimate.

Botnet

Malware

Backdoor

Spoofing

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It refers to someone who illegally access a computer or network.

Botnet

Hacker

Cracker

Unethical Employees

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is called when a perpetrator illegally obtain registration number and contain codes.

Illegal Copying

Illegal Registration/Activation

Software Theft

Unillegal Registration/ Activation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It refers to someone who use email for extortion.

Cyber Terrorist

Corporate Spies

Cyber Extortion

Backdoor

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a data that is readable by humans into encoded character.

Data

Codes

Encryption

Password

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are all areas where digital forensics used, EXCEPT.

Law Enforcement

Philippine Statistics Authority

Military Intelligence

Insurance Agencies

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?