CO2521 Week 08

CO2521 Week 08

University

10 Qs

quiz-placeholder

Similar activities

Quiz sulla Cybersecurity

Quiz sulla Cybersecurity

University

10 Qs

Cyber Security

Cyber Security

University

10 Qs

Quiz No. 3 - Network and Internet Privacy and Security

Quiz No. 3 - Network and Internet Privacy and Security

University

10 Qs

Social Engineering

Social Engineering

8th Grade - Professional Development

8 Qs

Quiz 2 - Understanding Security Threats

Quiz 2 - Understanding Security Threats

University

10 Qs

Lesson 5 - Internet Threats

Lesson 5 - Internet Threats

University

15 Qs

Windows 10 review (standard)

Windows 10 review (standard)

KG - University

9 Qs

Cyber Security (OE)

Cyber Security (OE)

University

15 Qs

CO2521 Week 08

CO2521 Week 08

Assessment

Quiz

Computers

University

Medium

Created by

Christopher Finnigan

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

DRAG AND DROP QUESTION

45 sec • 4 pts

  1. A​ (a)   password attack uses a list of common passwords and personal information to guess a password, while a ​ (b)   attack tries every combination of characters. The ​ (c)   type of attacks is more targeted and efficient than ​ (d)   type attack.

dictionary
brute force
first
second

2.

MATCH QUESTION

45 sec • 4 pts

  1. Match the terms to the meaning

  1. Aims to cause fear and disruption.

Social engineering

Manipulates people into revealing info

Phishing emails

Fake communications to gain information

  1. Cyberwarfare

  1. Nations cyberattack to damage others.

  1. Cyberterrorism

3.

DROPDOWN QUESTION

30 sec • 2 pts

A (a)   disguises itself as legitimate (b)   to trick users into installing it.

Trojan
software
Virus
Worm
password

4.

DROPDOWN QUESTION

30 sec • 1 pt

​ (a)   operates covertly, collecting information about user activity without their knowledge.

Spyware
Virus
Phishing
Brue-Forcing

5.

MATCH QUESTION

45 sec • 4 pts

Match the terms to their meanings

Network of compromised devices

Advanced Persistent Threat

A targeted, long-term cyberattack

Virus

A virus attaches to legitimate files

Information Extortion

Replicates itself and spreads autonomous

Worm

Threatens to a disrupt/release info

Botnet

6.

DROPDOWN QUESTION

30 sec • 1 pt

A ​ (a)   is a complete long-term interruption in electrical power

blackout
brownout
burnout
flashout

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the primary reasons for the increasing prevalence of malware?

Increased Connectivity

Automation

Software Vulnerabilities

Remote Access Technologies

All of these

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?