305 - DAY 5

305 - DAY 5

University

13 Qs

quiz-placeholder

Similar activities

cyber security

cyber security

KG - Professional Development

14 Qs

Hacking

Hacking

University

12 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

University

10 Qs

CSE_Chap1

CSE_Chap1

University

10 Qs

Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

University

10 Qs

Cyber Security quiz

Cyber Security quiz

University

15 Qs

Basic Networking (Y8)

Basic Networking (Y8)

7th Grade - University

10 Qs

305 - DAY 5

305 - DAY 5

Assessment

Quiz

Computers

University

Hard

Created by

Christian Fernandez

FREE Resource

13 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Is a technical effort to manipulate the expected behavior of network connections and connected systems. It refers to constructive, clever technical work that was not necessarily related to computer systems.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Is an entity or person who uses computers to gain unauthorized access to data or information.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Are standards and practices that influence how people lead their lives.

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Are a set of moral standards that govern the use of computers. It is society views about the use of computers, both hardware and software.

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Is a legal method of breaching a security system to detect potential security threats.

6.

FILL IN THE BLANK QUESTION

1 min • 5 pts

ENUMERATE (1-3) TYPES OF HACKER

7.

FILL IN THE BLANK QUESTION

1 min • 5 pts

ENUMERATE (4-6) TYPES OF HACKER

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?