
Security Basics & IT Profesionals (Chapter 1)
Authored by Firdaus Awang
Computers
4th Grade
Used 175+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the CORRECT goals of security.
Impudently, Integrity & Availability
Confidentiality, Smart & Availability
Confidentiality, Integrity & Availability
Confidentiality, Integrity & accessibility
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the CORRECT type of attack to computer security.
Physical Attack
Mentally Attack
Software Attack
Hardware Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Indentify the INCORRECT method of Security Attack.
Hacker
Reconnaissance Attack
Denial of Service Attack (DOS)
Malicious
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the INCORRECT source of security threat.
Unstructured
Structured
External and Internal
Malicious
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify THE TYPES of hacker.
Black Hats
Professionals
Pink Hats
Elite
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Recognize the BEST definition of Unstructured Security Threat.
Hackers can understand and develop exploit code and scripts.
Hackers understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses.
Hackers know system vulnerabilities
Testing and challenging a hacker’s skills.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify the CORRECT criteria of hackers.
A person who breaks into other people's computers with malicious intentions.
Such a person explorer computer and networks to discover his capabilities. He is a malicious intruder, thus, who tries to discover information by gaining unauthorized access.
Not only viruses, he or she may write other harmful programs that affect the working of network or create damages in your system.
When there is some kind of restricted access, this person may try to find ways around the protection, such as a rear door or loading dock that has poor security, or tail-gating somebody through a security badge reader controlled door, using fake credentials, etc.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
16 questions
Memory and storage for Grade 4
Quiz
•
4th Grade
18 questions
G3-W12-REVIEW Final 1
Quiz
•
2nd - 5th Grade
15 questions
Linux-2 Quiz 2 -- LAMP
Quiz
•
1st - 12th Grade
20 questions
Name The Disney Animation Films
Quiz
•
KG - University
20 questions
Computer lab rules
Quiz
•
3rd - 6th Grade
15 questions
Empowerment Technologies
Quiz
•
KG - 12th Grade
19 questions
G5 | Week 2 | Format and Text style
Quiz
•
2nd - 5th Grade
17 questions
Microsoft Office Quiz
Quiz
•
KG - 9th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
12 questions
Presidents' Day
Quiz
•
KG - 5th Grade
14 questions
Fractions to Decimals & Decimals to Fractions
Quiz
•
4th Grade
12 questions
Adding and Subtracting fractions with Like denominators quiz
Quiz
•
4th Grade
16 questions
multiplication facts
Quiz
•
4th Grade
14 questions
Adding and Subtracting Mixed Numbers with Like Denominators
Quiz
•
4th Grade