Internet Security and History of Hacking Quiz

Internet Security and History of Hacking Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

ADM Roll-Out Day 1 Quiz

ADM Roll-Out Day 1 Quiz

Professional Development

10 Qs

Cybersecurity. Conditionals

Cybersecurity. Conditionals

Professional Development

10 Qs

DTP & E-Commerce

DTP & E-Commerce

Professional Development

10 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

CertELTD

CertELTD

Professional Development

10 Qs

SHIP'S PARTICULARS

SHIP'S PARTICULARS

Professional Development

10 Qs

Class 2 Cycle 3

Class 2 Cycle 3

Professional Development

15 Qs

FCE - structure

FCE - structure

5th Grade - Professional Development

11 Qs

Internet Security and History of Hacking Quiz

Internet Security and History of Hacking Quiz

Assessment

Quiz

English

Professional Development

Hard

Created by

Alla Alla

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

o     A _________ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

SSL

firewall

digital certificate

malware

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

___________ is a protocol used to establish encrypted links between a web server and a browser.

digital certificate

Secure Sockets Layer

malware

encryption

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A ______________ is used to verify the identity of a user or a website and to establish a secure connection.

digital certificate

firewall

DDoS attack

Certificate Authority

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

_________ is malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.

malware

virus

worm

DDoS attack

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A ______ requires user action to spread (e.g., opening an infected file), while a ______ can spread independently without user intervention

virus/worm

worm/virus

DDos attack/worm

worm/DDos attack

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

__________ is the process of converting data into a secret code to prevent unauthorized access.

encryption

decoding

phishing

hacking

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A Certificate Authority is an organization that issues _______________ and verifies the identity of the certificate holder

digital certificates

malware

viruses

worms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?