Chapter 1-3

Chapter 1-3

12th Grade

48 Qs

quiz-placeholder

Similar activities

LATIHAN ASAS GANJIL XII INFORMATIKA

LATIHAN ASAS GANJIL XII INFORMATIKA

12th Grade

46 Qs

Quiz TIK

Quiz TIK

12th Grade

45 Qs

Microsoft Word Tekrar

Microsoft Word Tekrar

9th - 12th Grade

50 Qs

ÔN TẬP HK1

ÔN TẬP HK1

12th Grade

50 Qs

kuis  Jaringan Internet

kuis Jaringan Internet

9th Grade - University

50 Qs

TABLAS EN WORD

TABLAS EN WORD

6th - 12th Grade

45 Qs

Information Technology, the Internet, and You

Information Technology, the Internet, and You

12th Grade - University

46 Qs

INFORMATIKA

INFORMATIKA

12th Grade

43 Qs

Chapter 1-3

Chapter 1-3

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Clint Anthony

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

ping sweep

DoS

spoof

DDoS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a weakness that makes a target susceptible to an attack

a potential threat that a hacker creates

a computer that contains sensitive information

a method of attack to exploit a target

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Protect and Defend

Securely Provision

Oversight and Development

Analyze

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Thwarting cyber criminals includes which of the following? (Choose two.)

hiring hackers

shutting down the network

sharing cyber Intelligence information

establishing early warning systems

changing operating systems

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

DDoS

exhaustion

APT

algorithm

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

food

rock

employment

education

medical

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a amateur hacker?

script kiddie

blue team

red hat

black hat

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?