Security Basics & IT Profesionals (Chapter 1)
Quiz
•
Computers
•
4th Grade
•
Practice Problem
•
Hard
Firdaus Awang
Used 175+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the CORRECT goals of security.
Impudently, Integrity & Availability
Confidentiality, Smart & Availability
Confidentiality, Integrity & Availability
Confidentiality, Integrity & accessibility
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the CORRECT type of attack to computer security.
Physical Attack
Mentally Attack
Software Attack
Hardware Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Indentify the INCORRECT method of Security Attack.
Hacker
Reconnaissance Attack
Denial of Service Attack (DOS)
Malicious
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the INCORRECT source of security threat.
Unstructured
Structured
External and Internal
Malicious
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify THE TYPES of hacker.
Black Hats
Professionals
Pink Hats
Elite
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Recognize the BEST definition of Unstructured Security Threat.
Hackers can understand and develop exploit code and scripts.
Hackers understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses.
Hackers know system vulnerabilities
Testing and challenging a hacker’s skills.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify the CORRECT criteria of hackers.
A person who breaks into other people's computers with malicious intentions.
Such a person explorer computer and networks to discover his capabilities. He is a malicious intruder, thus, who tries to discover information by gaining unauthorized access.
Not only viruses, he or she may write other harmful programs that affect the working of network or create damages in your system.
When there is some kind of restricted access, this person may try to find ways around the protection, such as a rear door or loading dock that has poor security, or tail-gating somebody through a security badge reader controlled door, using fake credentials, etc.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
Technology Terms
Quiz
•
4th - 8th Grade
18 questions
Microsoft Word
Quiz
•
4th Grade
20 questions
Network ports
Quiz
•
1st Grade - University
20 questions
Microprocessors and passwords
Quiz
•
4th Grade
19 questions
bài ôn tin 4
Quiz
•
4th Grade
16 questions
Black History Bowl - Science and Discovery
Quiz
•
3rd - 8th Grade
20 questions
ON TAP KHOI 4 IC3
Quiz
•
1st - 5th Grade
15 questions
MS POWERPOINT
Quiz
•
4th Grade
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
Discover more resources for Computers
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
15 questions
Subject-Verb Agreement
Quiz
•
4th Grade
21 questions
Factors and Multiples
Quiz
•
4th Grade
20 questions
Prepositions and prepositional phrases
Quiz
•
4th Grade
13 questions
Point of View
Quiz
•
4th Grade
10 questions
Charlie Brown's Thanksgiving Adventures
Interactive video
•
2nd - 5th Grade
19 questions
Energy, Electricity,Conductors and Insulators
Quiz
•
4th Grade
14 questions
Context Clues
Quiz
•
4th - 6th Grade
