attacks

attacks

University

10 Qs

quiz-placeholder

Similar activities

Hari 3 -  Kuis Codding & Perkenalan AI

Hari 3 - Kuis Codding & Perkenalan AI

1st Grade - Professional Development

11 Qs

CIS1103  Week 9_10 CLO3 Part 1

CIS1103 Week 9_10 CLO3 Part 1

University

12 Qs

Computer Network

Computer Network

University

10 Qs

Hari 3 - Kuis Coding & Perkenalan AI

Hari 3 - Kuis Coding & Perkenalan AI

University

10 Qs

Unit 10 - Packet Switching

Unit 10 - Packet Switching

12th Grade - University

10 Qs

TCP/IP

TCP/IP

University

14 Qs

2.2 Methods of Error Detection Cambridge IGCSE 0478

2.2 Methods of Error Detection Cambridge IGCSE 0478

10th Grade - University

11 Qs

Ragam Aplikasi Komunikasi Data

Ragam Aplikasi Komunikasi Data

University

10 Qs

attacks

attacks

Assessment

Quiz

Computers

University

Easy

Created by

Rubeena 2553

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many phases are there in IoT with regard to Attacks

2

4

5

7

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attack on authentication happens in which phase ?

storage

processing

transmission

data perception

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attack on availability happens in which phase ?

storage

processing

transmission

data perception

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

attack on channel security happens in which phase ?

storage

processing

transmission

data perception

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

data leakage happens in which phase ?

storage

processing

transmission

data perception

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

-----------------------------consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.

force attack

brute force attack

mega force attack

cyber attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search.

true

false

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?