Internet Security and History of Hacking Quiz

Internet Security and History of Hacking Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

اختبار الترجمة العربية والإنجليزية (عربنيت - رقم المستند ١٧-٢١)

اختبار الترجمة العربية والإنجليزية (عربنيت - رقم المستند ١٧-٢١)

Professional Development

12 Qs

erudite orators

erudite orators

KG - Professional Development

13 Qs

QUIZ - Review Unit 7

QUIZ - Review Unit 7

Professional Development

18 Qs

DTP & E-Commerce

DTP & E-Commerce

Professional Development

10 Qs

CertELTD

CertELTD

Professional Development

10 Qs

STANDARDS PROFESSIONAL PRACTICE

STANDARDS PROFESSIONAL PRACTICE

Professional Development

20 Qs

Cybersecurity. Conditionals

Cybersecurity. Conditionals

Professional Development

10 Qs

The Job - Benefits and Qualifications

The Job - Benefits and Qualifications

11th Grade - Professional Development

10 Qs

Internet Security and History of Hacking Quiz

Internet Security and History of Hacking Quiz

Assessment

Quiz

English

Professional Development

Hard

Created by

Alla Alla

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

o     A _________ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

SSL

firewall

digital certificate

malware

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

___________ is a protocol used to establish encrypted links between a web server and a browser.

digital certificate

Secure Sockets Layer

malware

encryption

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A ______________ is used to verify the identity of a user or a website and to establish a secure connection.

digital certificate

firewall

DDoS attack

Certificate Authority

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

_________ is malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.

malware

virus

worm

DDoS attack

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A ______ requires user action to spread (e.g., opening an infected file), while a ______ can spread independently without user intervention

virus/worm

worm/virus

DDos attack/worm

worm/DDos attack

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

__________ is the process of converting data into a secret code to prevent unauthorized access.

encryption

decoding

phishing

hacking

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A Certificate Authority is an organization that issues _______________ and verifies the identity of the certificate holder

digital certificates

malware

viruses

worms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?