css_quiz_10.08.10

css_quiz_10.08.10

Professional Development

10 Qs

quiz-placeholder

Similar activities

Five Nights At Freddy's: Security Breach Quiz

Five Nights At Freddy's: Security Breach Quiz

KG - Professional Development

13 Qs

JAVA - Arrays

JAVA - Arrays

University - Professional Development

15 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Number System

Number System

Professional Development

10 Qs

Code Blaze - Round -1

Code Blaze - Round -1

University - Professional Development

10 Qs

PRACTICE  SET FOR INTERMEDIATE 2

PRACTICE SET FOR INTERMEDIATE 2

Professional Development

10 Qs

Snapdragon Academy

Snapdragon Academy

Professional Development

10 Qs

Is Your AWS Cloud Well Architected

Is Your AWS Cloud Well Architected

Professional Development

10 Qs

css_quiz_10.08.10

css_quiz_10.08.10

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

NEHA GUPTA

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The word X is a combination of the words “robot” and “network”. It is a number of Internet-connected devices, each of which is running one or more bots. This can be used to perform DDoS attacks, steal data, send spam. Identify the word X?

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

X has been defined as “any act that influences a person to take an action that may or may not be in their best interests.”. Basically, it is the psychological manipulation of people into performing actions or divulging confidential information. What is X?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If DoS – Denial of Service

What is DDoS?

Distributed Denial of Service

Denial Distributed of Service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

X is an algorithm on a computer system that bypasses security controls. Generally, this is added by the original developer for some legitimate access, which may also be used by a hacker in a malicious way. What is this form of vulnerability called?

Backdoor

Spoofing

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What does the acronym VIRUS stand for?

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What was created to sabotage Iran’s nuclear program?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method of hacking will record all your keystrokes?

a) Keyhijacking

b) Keyjacking

c) Keylogging

d) Keyboard monitoring

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?