COMPUTER ATTACKS

COMPUTER ATTACKS

University

16 Qs

quiz-placeholder

Similar activities

Java Script Pro

Java Script Pro

3rd Grade - University

12 Qs

Immunoloจึ้ง

Immunoloจึ้ง

University

20 Qs

Soal Latihan PPPK

Soal Latihan PPPK

12th Grade - Professional Development

20 Qs

Adwords Fundamentals??? Basic lang yan! T_T

Adwords Fundamentals??? Basic lang yan! T_T

University - Professional Development

20 Qs

quiz pintar

quiz pintar

University

15 Qs

Goosebumps

Goosebumps

1st Grade - Professional Development

15 Qs

Fantastic beasts The crimes of Grindelwald

Fantastic beasts The crimes of Grindelwald

1st Grade - University

20 Qs

Conceitos Básicos de Psicologia Organizacional

Conceitos Básicos de Psicologia Organizacional

University

15 Qs

COMPUTER ATTACKS

COMPUTER ATTACKS

Assessment

Quiz

Other

University

Practice Problem

Medium

Created by

nazatul hamizi

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many steps that criminals use to attack information system:

6 steps
5 steps
7 steps
10 steps

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are 6 steps that criminals use to attack information system:

conduct reconnaissance,

attempt social engineering,

scan the target, research,

execute target, cover tracks

attempt social engineering, conduct reconnaissance, scan target, research, cover tracks, execute target

conduct reconnaissance, scan the target, attempt social engineering, research, execute target, cover tracks

attempt social engineering, conduct reconnaissance, scan target, research, cover tracks, execute target

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Botnets are used to perform a which is designed to make a resource unavailable to its users.


brute force attack

dictionary attack

zero-day attack

denial of service attack

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Botnet also known as .

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the best defense against brute force attack ?

adware

patch

keylogger

monitoring system activity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Password cracking can used to help users recover forgotten password and to generate user ID.


TRUE

FALSE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of trial-and error method in brute force attack?

Guessing the password and user ID

Using a dictionary of common passwords
Using a random password generator

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?