attacks

attacks

University

10 Qs

quiz-placeholder

Similar activities

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

C++ Array Quiz

C++ Array Quiz

University

10 Qs

quiz pertemuan 2 asik ddp

quiz pertemuan 2 asik ddp

University

15 Qs

Information System and Modern Organization part 1

Information System and Modern Organization part 1

University

14 Qs

ULANGAN HARIAN TIK

ULANGAN HARIAN TIK

10th Grade - University

10 Qs

Software Testing

Software Testing

University

10 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

attacks

attacks

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Rubeena 2553

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many phases are there in IoT with regard to Attacks

2

4

5

7

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attack on authentication happens in which phase ?

storage

processing

transmission

data perception

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attack on availability happens in which phase ?

storage

processing

transmission

data perception

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

attack on channel security happens in which phase ?

storage

processing

transmission

data perception

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

data leakage happens in which phase ?

storage

processing

transmission

data perception

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

-----------------------------consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.

force attack

brute force attack

mega force attack

cyber attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search.

true

false

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers