Search Header Logo

Basic Introduction Of hacking

Authored by Lovely Parrot

Education, Computers

Professional Development

Used 94+ times

Basic Introduction Of hacking
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When paying for products online it is best ot check the website starts with the protocol HTTPS and shows a

padlock.

What is this known as ?

Security lab

Encryption

Firewall

Secure Socket Layer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a password that consists of combination of latter, both uppercase and lowercase, numbers and symbol is known as which of the following ?

Secure Password

Solid Password

Keylogger Password

Trojan Password

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hackers who engage in hacking for illeagal purposes are known as which of the following ?

Red hat hacker

Black hat hacker

Blue hat hacker

White hat hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is the name of the software that is designed to record every action which is typed with the aim of stealing sensitive data?

Trojan horse

Worm

Keylogger

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the trojan horse ?

A virus that replicate itself through computer networks

A virus that block devices access until money is paid

A program that will remember your account details, such as name and login details the next time you visit a wesite

Software the pretends to be a useful program but is actually carrying out hidden, harmful activity.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does GDPR stand for ?

Great Danes Performance Ratings

General data Protection Records

General Disclosure Protection Regulations

General Data Protection Regulation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Purpose anti-virus software ?

To make chocolate

To prevent hackers form accessing the network

To block unauthorised connection to the network

To Prevent a virus from attacking the network

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?