Basic Introduction Of hacking

Basic Introduction Of hacking

Professional Development

10 Qs

quiz-placeholder

Similar activities

Capacitación Zoom

Capacitación Zoom

Professional Development

10 Qs

Maya Angelou

Maya Angelou

2nd Grade - Professional Development

10 Qs

Arabic alphabet, the first 14  letters

Arabic alphabet, the first 14 letters

Professional Development

10 Qs

Labour and Fetal Asphyxia

Labour and Fetal Asphyxia

Professional Development

10 Qs

PLAL Agile Onboarding

PLAL Agile Onboarding

Professional Development

10 Qs

social engineering

social engineering

1st Grade - Professional Development

10 Qs

Evaluación de Salida - semana 4

Evaluación de Salida - semana 4

Professional Development

10 Qs

Diagnóstico Apropiación Tecnológica

Diagnóstico Apropiación Tecnológica

1st Grade - Professional Development

15 Qs

Basic Introduction Of hacking

Basic Introduction Of hacking

Assessment

Quiz

Education, Computers

Professional Development

Practice Problem

Hard

Created by

Lovely Parrot

Used 94+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When paying for products online it is best ot check the website starts with the protocol HTTPS and shows a

padlock.

What is this known as ?

Security lab

Encryption

Firewall

Secure Socket Layer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a password that consists of combination of latter, both uppercase and lowercase, numbers and symbol is known as which of the following ?

Secure Password

Solid Password

Keylogger Password

Trojan Password

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hackers who engage in hacking for illeagal purposes are known as which of the following ?

Red hat hacker

Black hat hacker

Blue hat hacker

White hat hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is the name of the software that is designed to record every action which is typed with the aim of stealing sensitive data?

Trojan horse

Worm

Keylogger

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the trojan horse ?

A virus that replicate itself through computer networks

A virus that block devices access until money is paid

A program that will remember your account details, such as name and login details the next time you visit a wesite

Software the pretends to be a useful program but is actually carrying out hidden, harmful activity.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does GDPR stand for ?

Great Danes Performance Ratings

General data Protection Records

General Disclosure Protection Regulations

General Data Protection Regulation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Purpose anti-virus software ?

To make chocolate

To prevent hackers form accessing the network

To block unauthorised connection to the network

To Prevent a virus from attacking the network

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?