Internet Security and History of Hacking Quiz

Internet Security and History of Hacking Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

STANDARDS PROFESSIONAL PRACTICE

STANDARDS PROFESSIONAL PRACTICE

Professional Development

20 Qs

The Job - Benefits and Qualifications

The Job - Benefits and Qualifications

11th Grade - Professional Development

10 Qs

Data Breaches in USA

Data Breaches in USA

Professional Development

15 Qs

FCE Structure

FCE Structure

10th Grade - Professional Development

11 Qs

mid-Course Evaluation Poll

mid-Course Evaluation Poll

Professional Development

15 Qs

PHONETICS  DAM

PHONETICS DAM

Professional Development

20 Qs

اختبار الترجمة العربية والإنجليزية (عربنيت - رقم المستند ١٧-٢١)

اختبار الترجمة العربية والإنجليزية (عربنيت - رقم المستند ١٧-٢١)

Professional Development

12 Qs

erudite orators

erudite orators

KG - Professional Development

13 Qs

Internet Security and History of Hacking Quiz

Internet Security and History of Hacking Quiz

Assessment

Quiz

English

Professional Development

Hard

Created by

Alla Alla

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

o     A _________ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

SSL

firewall

digital certificate

malware

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

___________ is a protocol used to establish encrypted links between a web server and a browser.

digital certificate

Secure Sockets Layer

malware

encryption

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A ______________ is used to verify the identity of a user or a website and to establish a secure connection.

digital certificate

firewall

DDoS attack

Certificate Authority

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

_________ is malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.

malware

virus

worm

DDoS attack

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A ______ requires user action to spread (e.g., opening an infected file), while a ______ can spread independently without user intervention

virus/worm

worm/virus

DDos attack/worm

worm/DDos attack

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

__________ is the process of converting data into a secret code to prevent unauthorized access.

encryption

decoding

phishing

hacking

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A Certificate Authority is an organization that issues _______________ and verifies the identity of the certificate holder

digital certificates

malware

viruses

worms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?