Search Header Logo

Methods of Security Attacks

Authored by ABDUL HAKIM BIN ABDUL AZIZ (PSMZA)

Information Technology (IT)

11th Grade

Used 3+ times

Methods of Security Attacks
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

31 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What are passive attacks in security?

Evaluate responses using AI:

OFF

Answer explanation

Passive attacks in security involve eavesdropping or monitoring data without altering it. Attackers gather information without detection, making it difficult to prevent or trace, unlike active attacks that disrupt or manipulate data.

2.

OPEN ENDED QUESTION

3 mins • 1 pt

What are active attacks in security?

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What are close-in attacks?

Evaluate responses using AI:

OFF

Answer explanation

Close-in attacks refer to security threats that occur when an attacker is physically close to a target, allowing them to exploit vulnerabilities directly, often bypassing remote defenses.

4.

OPEN ENDED QUESTION

3 mins • 1 pt

What are insider attacks?

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

What is a reconnaissance attack?

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 1 pt

What is an access attack?

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

What is a DoS/DDoS attack?

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?