css_quiz_10.08.10

css_quiz_10.08.10

Professional Development

10 Qs

quiz-placeholder

Similar activities

Gen. Assembly Recap Day 1

Gen. Assembly Recap Day 1

Professional Development

15 Qs

UDC 2022

UDC 2022

Professional Development

10 Qs

Mastering KineMaster

Mastering KineMaster

Professional Development

10 Qs

KOE034: Sensors and Instruments

KOE034: Sensors and Instruments

Professional Development

11 Qs

Maintain Files and Folders

Maintain Files and Folders

Professional Development

10 Qs

OWASP Top 10

OWASP Top 10

Professional Development

10 Qs

Computer Hardware and Software Quiz

Computer Hardware and Software Quiz

Professional Development

10 Qs

Python Test 1

Python Test 1

Professional Development

10 Qs

css_quiz_10.08.10

css_quiz_10.08.10

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

NEHA GUPTA

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The word X is a combination of the words “robot” and “network”. It is a number of Internet-connected devices, each of which is running one or more bots. This can be used to perform DDoS attacks, steal data, send spam. Identify the word X?

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

X has been defined as “any act that influences a person to take an action that may or may not be in their best interests.”. Basically, it is the psychological manipulation of people into performing actions or divulging confidential information. What is X?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If DoS – Denial of Service

What is DDoS?

Distributed Denial of Service

Denial Distributed of Service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

X is an algorithm on a computer system that bypasses security controls. Generally, this is added by the original developer for some legitimate access, which may also be used by a hacker in a malicious way. What is this form of vulnerability called?

Backdoor

Spoofing

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What does the acronym VIRUS stand for?

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What was created to sabotage Iran’s nuclear program?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method of hacking will record all your keystrokes?

a) Keyhijacking

b) Keyjacking

c) Keylogging

d) Keyboard monitoring

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?