Cyber Security Vocabulary (Set 3)

Cyber Security Vocabulary (Set 3)

10 Qs

quiz-placeholder

Similar activities

Hidden Figures: Young Readers Edition Chpt. 1-9

Hidden Figures: Young Readers Edition Chpt. 1-9

7th Grade

13 Qs

Quiz sull'intelligenza artificiale

Quiz sull'intelligenza artificiale

KG - University

10 Qs

E_Blue_CAD and Onshape Quiz

E_Blue_CAD and Onshape Quiz

KG - University

12 Qs

Scratch-ponavljanje- 3 razred

Scratch-ponavljanje- 3 razred

KG - University

12 Qs

Hidden Figures Quiz

Hidden Figures Quiz

KG - University

12 Qs

Training Pengelolaan B3 (Bahan Berbahaya Beracun)

Training Pengelolaan B3 (Bahan Berbahaya Beracun)

KG - University

10 Qs

Spring Test 2024 for Class V  Form

Spring Test 2024 for Class V Form

KG - University

11 Qs

Level 1 - Software/OS Quiz

Level 1 - Software/OS Quiz

KG - University

9 Qs

Cyber Security Vocabulary (Set 3)

Cyber Security Vocabulary (Set 3)

Assessment

Quiz

others

Medium

Created by

CHANCY ZAHRT

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system in which all computer programs and data is stored on a central server.
Data Table
Server
Software
Cloud Computing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Programs and other operating information used by a computer.
hardware
software
cloud computer
IP address

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A number that uniquely identifies each computer or device connected to the Internet.
Coding
Server
Software
IP Address

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Program that hides in a computer and allows someone from a remote location to take full control of the computer.
Rootkit
Hacker
Cloud Computer
Software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The practice of allowing users to use their own personal devices to connect to an organizational network.
Software
BYOD
Servers
RootKit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the computer systems of an organization are deliberately attacked to find any weaknesses
Hackers
Pen Testing
Rootkit
Social Engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hackers use their social skills to trick people into revealing access credentials or other valuable information.
Rootkit
Pen Testing
social engineering
Clickjacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?