Found. of IT: Security Threats - B

Found. of IT: Security Threats - B

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

PH3 Sistem Keamanan Jaringan Komputer

PH3 Sistem Keamanan Jaringan Komputer

11th Grade

15 Qs

Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

10th Grade

15 Qs

ICT-BEd_4th Semester

ICT-BEd_4th Semester

10th Grade - University

15 Qs

Security Domain

Security Domain

11th Grade

12 Qs

Ancaman dan Solusi serangan peretas kata sandi

Ancaman dan Solusi serangan peretas kata sandi

9th Grade

15 Qs

Y9 Social Engineering

Y9 Social Engineering

9th Grade

10 Qs

Computer Crime

Computer Crime

10th - 12th Grade

7 Qs

Smishing Phishing Vishing Pharming

Smishing Phishing Vishing Pharming

10th Grade

14 Qs

Found. of IT: Security Threats - B

Found. of IT: Security Threats - B

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack in which the goal is to pretend to be someone else.

Spoofing

Logic Bomb

Pharming

Black Hat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Exposes security flaws for financial gain or malicious reasons.

Spoofing

Logic Bomb

Pharming

Black Hat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Redirects a request for a website to a similar looking, but fake website.

Spoofing

Logic Bomb

Pharming

Black Hat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious code that sits dormant until triggered by an event, such as a date.

Spoofing

Logic Bomb

Pharming

Black Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Looking for a person's information in the trash that can be used to carry out an attack.

Spoofing

Logic Bomb

Dumpster Diving

Black Hat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An automated password attack that uses a predetermined list of possible values.

Spoofing

Logic Bomb

Dumpster Diving

Dictionary Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of password cracking software to attempt every possible password combination.

Spoofing

Brute Force Attack

Dumpster Diving

Dictionary Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?