Chapter 1-3

Chapter 1-3

12th Grade

•

48 Qs

quiz-placeholder

Similar activities

Sec-D  Javascript-1

Sec-D Javascript-1

12th Grade - University

•

52 Qs

STRUCTURED QUERY LANGUAGE

STRUCTURED QUERY LANGUAGE

12th Grade

•

46 Qs

SOALAN TMK

SOALAN TMK

KG - University

•

46 Qs

ULANGAN HARIAN TEKNIK PENGOLAHAN AUDIO DAN VIDEO

ULANGAN HARIAN TEKNIK PENGOLAHAN AUDIO DAN VIDEO

1st - 12th Grade

•

50 Qs

Intro to Computing Midterms

Intro to Computing Midterms

12th Grade

•

50 Qs

UH ORIENTASI DASAR TEKNIK JARINGAN KOMPUTER DAN TELEKOMUNIKASI

UH ORIENTASI DASAR TEKNIK JARINGAN KOMPUTER DAN TELEKOMUNIKASI

10th Grade - University

•

50 Qs

Quiz sobre Diseño Gráfico y Tipos de Archivos de Imagen

Quiz sobre Diseño Gráfico y Tipos de Archivos de Imagen

10th Grade - University

•

45 Qs

Adobe Photoshop

Adobe Photoshop

10th Grade - Professional Development

•

50 Qs

Chapter 1-3

Chapter 1-3

Assessment

Quiz

•

Computers

•

12th Grade

•

Practice Problem

•

Easy

Created by

Clint Anthony

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

ping sweep

DoS

spoof

DDoS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a weakness that makes a target susceptible to an attack

a potential threat that a hacker creates

a computer that contains sensitive information

a method of attack to exploit a target

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Protect and Defend

Securely Provision

Oversight and Development

Analyze

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Thwarting cyber criminals includes which of the following? (Choose two.)

hiring hackers

shutting down the network

sharing cyber Intelligence information

establishing early warning systems

changing operating systems

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

DDoS

exhaustion

APT

algorithm

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

food

rock

employment

education

medical

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a amateur hacker?

script kiddie

blue team

red hat

black hat

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?