IAS1 - LAP5 - 3D

IAS1 - LAP5 - 3D

12th Grade

19 Qs

Similar activities

YEAR 7 MID-TERM  ASSESSMENT

YEAR 7 MID-TERM ASSESSMENT

7th Grade - University

20 Qs

Initial Assessment 12B Semester 2

Initial Assessment 12B Semester 2

12th Grade

23 Qs

KEAMANAN DATA

KEAMANAN DATA

9th - 12th Grade

15 Qs

Ulangan Harian 1

Ulangan Harian 1

9th Grade - University

15 Qs

PRE TEST Basic Cyber Security

PRE TEST Basic Cyber Security

12th Grade

20 Qs

Penilaian Akhir Semester Informatika

Penilaian Akhir Semester Informatika

9th - 12th Grade

20 Qs

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

Cybersecurity and Malware Plenary Quiz Grade 10

Cybersecurity and Malware Plenary Quiz Grade 10

9th - 12th Grade

15 Qs

IAS1 - LAP5 - 3D

IAS1 - LAP5 - 3D

Assessment

Quiz

Created by

jay stewart

Information Technology (IT)

12th Grade

5 plays

Medium

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an attack in the context of cybersecurity?

An act that takes advantage of a vulnerability

A type of malware

A method of data encryption

A security protocol

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does malicious code include?

Viruses and worms

Firewalls

Encryption software

Antivirus programs

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a bot in cybersecurity?

An automated software program

A type of virus

A security measure

A network protocol

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a hoax in the context of cybersecurity?

A false warning about a virus

A type of malware

A security breach

A method of data recovery

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a back door in cybersecurity?

An unauthorized access point

A type of firewall

A method of data encryption

A security protocol

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is password cracking?

Reversing a hashed password

Creating a new password

Encrypting a password

Storing a password securely

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a brute force attack?

Trying every possible password combination

Using a dictionary of common passwords

Exploiting a software vulnerability

Sending a large number of requests to a server

8.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a denial-of-service (DoS) attack?

Overloading a target system with requests

Gaining unauthorized access to a system

Stealing sensitive information

Distributing malware across a network

9.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is IP spoofing?

Forging the source IP address of messages

Encrypting data packets

Creating a secure connection

Monitoring network traffic

10.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is unsolicited commercial e-mail commonly known as?

Spam

Phishing

Malware

Trojan

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?