IGCSE - 5- Threats

IGCSE - 5- Threats

10th Grade

45 Qs

quiz-placeholder

Similar activities

Grade 6-Sistem Komputer

Grade 6-Sistem Komputer

6th Grade - University

40 Qs

BAB 3 INTEGRASI ANTAR APLIKASI OFFICE

BAB 3 INTEGRASI ANTAR APLIKASI OFFICE

10th Grade

40 Qs

98-368 Mobility and Devices Fundamentals Study Guide

98-368 Mobility and Devices Fundamentals Study Guide

9th - 12th Grade

40 Qs

SOAL PAS 2018 - Teknik Mikroprosessor & Mikrokontroller XD TEI

SOAL PAS 2018 - Teknik Mikroprosessor & Mikrokontroller XD TEI

10th Grade

40 Qs

Elektronika Dasar

Elektronika Dasar

10th Grade

50 Qs

Latihan UNBK TKJ 2019

Latihan UNBK TKJ 2019

10th Grade - University

50 Qs

Utilizarea computerului

Utilizarea computerului

10th Grade

40 Qs

Grade 4-Sistem Komputer

Grade 4-Sistem Komputer

4th Grade - University

50 Qs

IGCSE - 5- Threats

IGCSE - 5- Threats

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Phương Nguyễn

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which activity best describes hacking?

Installing antivirus

Gaining unauthorized access to systems

Phishing through social media

Setting up a firewall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of hacking?

To explore and analyze systems for improvement

To spread malware and steal information

To create secure software

To scam people

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a "black hat" hacker?

A hacker who only conducts ethical hacking

A hacker who follows the laws and regulations of hacking

A hacker who exploits systems for malicious purposes

A hacker who specializes in programming

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In ethical hacking, what is the purpose of vulnerability assessment?

To exploit weaknesses for personal gain

To discover and report security gaps in a system

To create new vulnerabilities

To bypass security measures without detection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering primarily concerned with?

Manipulating individuals into providing confidential information

Training staff to better understand human psychological behavior such as fear, trust, and curiosity.

Writing secure code for applications

Improving social skills of employees in the workplace

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common technique used in social engineering?

Phishing emails

Denial of Service attacks

Packet sniffing

DNS cache poisoning

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "baiting" in the context of social engineering attacks?

Offering a free gift to entice victims into providing information

Intercepting packets in a network

Encrypting data to protect it from unauthorized access

Creating fake profiles on social media

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?