cyber security

cyber security

University

15 Qs

quiz-placeholder

Similar activities

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Software Engineering :TEST 2

Software Engineering :TEST 2

University

10 Qs

Redes I- Componentes y tipos de redes

Redes I- Componentes y tipos de redes

University

20 Qs

ADVACOMT-Quiz No.1 (final term)

ADVACOMT-Quiz No.1 (final term)

University

15 Qs

Què en saps de GSuite?

Què en saps de GSuite?

University - Professional Development

10 Qs

Firewall and Network Security

Firewall and Network Security

University

15 Qs

Soal SKD

Soal SKD

University - Professional Development

10 Qs

Week 4

Week 4

University

15 Qs

cyber security

cyber security

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Ragini Sharma

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a phases of planning a cybercrime

Scanning and scrutinizing

Coding

Reconnaissance

Launching an attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The type of attack, where the hacker pretends to be a VIP or high-level manager who has the authority to use computer systems or files

Impersonating an employee or valid user

Posing as an important user

Using a third person

Calling technical support

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______is the technique of gathering passwords by watching over a person’s shoulder while they log in to the system.

Fake E-mails

Baiting

Shoulder Surfing

Dumpster

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______is an attack/threat that exploits a previously unknown vulnerability in a computer application or operating system, one that developers have not had time to address and patch.

On launch attack

Vulnerability attack

Hack attack

Zero-day attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Google Apps is an example of:

Infrastructure -as -a -service(IaaS)

Platform -as -a -service(PaaS)

Application-as-a-service(AaaS)

Software-as-a-service(SaaS)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is notorious art of breaking into phone or other communication systems.

Hacking

Cracking

Phreaking

Communicating

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____is one who thinks before acting or committing a malice or non-malice deed.

Black Hat

White Hat

Blue Hat

Brown Hat

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers