Search Header Logo

14 Jan Unit 3

Authored by David Burns

Computers

11th - 12th Grade

Used 1+ times

14 Jan Unit 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who are Ethical Hackers employed by?

IT Manager

System Owner

System Manager

System Administrator

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the types of Ethical Hacker?

White Hat Hacker

White Hate Hacker

Black Hat Hacker

Black Hate Hacker

3.

FILL IN THE BLANK QUESTION

1 min • 2 pts

an ethical hacker or a computer security expert that specialise in entering computer systems and networks to find vulnerabilities is know as a _________ Hat Hacker

4.

FILL IN THE BLANK QUESTION

1 min • 2 pts

What law makes it an offence to intentionally and without lawful authority to intercept any communication which is transmitted on a public or private communication system?

5.

FILL IN THE BLANK QUESTION

1 min • 2 pts

The Computer Misuse Act was introduced in what year?

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

hubs, routers, bridges, gateways, modems, calling, telephone systems are an example of what group of equipment/assets?

7.

FILL IN THE BLANK QUESTION

1 min • 2 pts

What systems maintain a log of the activities identified during monitoring and control access to data, hardware or software?

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?