
Computer Science (1-9) - Identifying & Preventing Threats
Authored by E Clarke
Computers
University
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Pen testing - is the practice of deliberately trying to find security holes in your own systems
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Is there such a thing as ethical hacking?
Yes
No
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Employing a hacker to test out a system is called?
White-hat hacker
Black-hat hacker
Grey-hat hacker
Red-hat hacker
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A feature of a strongest type of password
All lower case
Upper case and lower case
Alphanumeric
Upper & lower case, Alphanumeric and symbols
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A gateway between one network and another can be referred to as a?
Network Bridge
Ethernet cable
Proxy Server
Switch
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
HTTPS can be described as?
Unsecure protocol
Secure protocol
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Every machine should have what installed to prevent network vulnerabilities?
Application software
Anti malware
Anti spam
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?