ias615: Group 1 : Computer Attack (Part 1)

ias615: Group 1 : Computer Attack (Part 1)

University

10 Qs

quiz-placeholder

Similar activities

Computational Thinking in Python[Quiz 3]

Computational Thinking in Python[Quiz 3]

University

15 Qs

JRB2 Quiz 4

JRB2 Quiz 4

University

10 Qs

TOOLS FOR AD & TECHNOLOGY DEVELOPMENT (W4-W6)

TOOLS FOR AD & TECHNOLOGY DEVELOPMENT (W4-W6)

University

10 Qs

Understanding Email, Contacts and Calendaring

Understanding Email, Contacts and Calendaring

University

10 Qs

ICT 0513 - Chapter 4 : System Unit

ICT 0513 - Chapter 4 : System Unit

University

15 Qs

Perangkat komputer

Perangkat komputer

University

10 Qs

Tree and Planar Graph

Tree and Planar Graph

University

10 Qs

CodeMonkey for B.Ed IT

CodeMonkey for B.Ed IT

University

10 Qs

ias615: Group 1 : Computer Attack (Part 1)

ias615: Group 1 : Computer Attack (Part 1)

Assessment

Quiz

Computers

University

Hard

Created by

NUR Thaqifah

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

1. What is the primary objective of conducting reconnaissance in computer attacks?

A) To execute the attack successfully

B) To cover tracks after the attack

C) To identify potential vulnerabilities and gather information about the target

D) To gain control of hijacked computers

2.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

2. What is hacking primarily defined as in the context of computer attacks?

A) Unauthorized access to computer systems using social engineering techniques.

B) Gaining control of a computer to carry out illicit activities without the user's knowledge.

C) Sending unsolicited messages to many people simultaneously to spread malware.

D) The unauthorized access, modification, or use of an electronic device or some element of a computer system.

3.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

3. Which term refers to the gaining control of a computer to carry out illicit activities without the user's knowledge?

A) Hacking

B) Social engineering

C) Hijacking

D) Bot herding

4.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

4. What is a botnet primarily used for?

A) Performing denial-of-service attacks and spreading malware

B) Executing hacking attempts

C)Social engineering attacks

D) Researching known vulnerabilities in software

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

5. What is the main objective of a denial-of-service (DoS) attack?

A) To gain unauthorized access to information systems

B) To recover forgotten passwords

C) To make a resource unavailable to its users

D) To generate usernames and passwords for credential recycling

6.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

6. What is a password cracking?

A) Sending unsolicited messages to many people simultaneously

B) Recovering passwords by trying every possible combination

C) Making electronic communications appear as if someone else sent them

D) Creating Internet Protocol packets with forged IP addresses

7.

MULTIPLE CHOICE QUESTION

10 sec • 6 pts

7. What is a dictionary attack primarily used for in the context of computer security?

A) Generating user IDs and password guesses using a dictionary of possible combinations to reduce the number of guesses required

B) Recovering passwords by trying every possible combination of upper- and lower-case letters, numbers, and special characters

C) Guessing e-mail addresses at a company and sending blank e-mail messages

D) Sending unsolicited messages to many people simultaneously

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?