
ias615: Group 1 : Computer Attack (Part 1)
Authored by NUR Thaqifah
Computers
University
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
1. What is the primary objective of conducting reconnaissance in computer attacks?
A) To execute the attack successfully
B) To cover tracks after the attack
C) To identify potential vulnerabilities and gather information about the target
D) To gain control of hijacked computers
2.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
2. What is hacking primarily defined as in the context of computer attacks?
A) Unauthorized access to computer systems using social engineering techniques.
B) Gaining control of a computer to carry out illicit activities without the user's knowledge.
C) Sending unsolicited messages to many people simultaneously to spread malware.
D) The unauthorized access, modification, or use of an electronic device or some element of a computer system.
3.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
3. Which term refers to the gaining control of a computer to carry out illicit activities without the user's knowledge?
A) Hacking
B) Social engineering
C) Hijacking
D) Bot herding
4.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
4. What is a botnet primarily used for?
A) Performing denial-of-service attacks and spreading malware
B) Executing hacking attempts
C)Social engineering attacks
D) Researching known vulnerabilities in software
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
5. What is the main objective of a denial-of-service (DoS) attack?
A) To gain unauthorized access to information systems
B) To recover forgotten passwords
C) To make a resource unavailable to its users
D) To generate usernames and passwords for credential recycling
6.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
6. What is a password cracking?
A) Sending unsolicited messages to many people simultaneously
B) Recovering passwords by trying every possible combination
C) Making electronic communications appear as if someone else sent them
D) Creating Internet Protocol packets with forged IP addresses
7.
MULTIPLE CHOICE QUESTION
10 sec • 6 pts
7. What is a dictionary attack primarily used for in the context of computer security?
A) Generating user IDs and password guesses using a dictionary of possible combinations to reduce the number of guesses required
B) Recovering passwords by trying every possible combination of upper- and lower-case letters, numbers, and special characters
C) Guessing e-mail addresses at a company and sending blank e-mail messages
D) Sending unsolicited messages to many people simultaneously
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
7 questions
Data mining-Clustering-1
Quiz
•
University
15 questions
GIS Unit III
Quiz
•
University
15 questions
Computer and Other Human Inventions
Quiz
•
University
10 questions
Python with DataScience
Quiz
•
7th Grade - University
15 questions
Robotics Prelim
Quiz
•
University
10 questions
UTILITY PROGRAM
Quiz
•
University
10 questions
Data Warehouse - Foundations
Quiz
•
University
13 questions
Digital Technology Office 365 - 29May2020
Quiz
•
University - Professi...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
5 questions
Examining Theme
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University