COMPUTER ATTACKS

COMPUTER ATTACKS

University

16 Qs

quiz-placeholder

Similar activities

Quiz-1 Introduction to RADAR_UNIT-IV

Quiz-1 Introduction to RADAR_UNIT-IV

University

15 Qs

Ch:5 Cost-Volume-Profit Analysis

Ch:5 Cost-Volume-Profit Analysis

University

16 Qs

Market Identification and Analysis

Market Identification and Analysis

University

20 Qs

Attacks on 9/11/01

Attacks on 9/11/01

7th Grade - University

18 Qs

Musical Terms

Musical Terms

6th Grade - University

19 Qs

cost accounting

cost accounting

University

11 Qs

anime

anime

5th Grade - Professional Development

17 Qs

Sosialisasi Pengelolaan Kinerja dan Penyusunan SKP 2021

Sosialisasi Pengelolaan Kinerja dan Penyusunan SKP 2021

University

15 Qs

COMPUTER ATTACKS

COMPUTER ATTACKS

Assessment

Quiz

Other

University

Medium

Created by

nazatul hamizi

Used 3+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many steps that criminals use to attack information system:

6 steps
5 steps
7 steps
10 steps

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are 6 steps that criminals use to attack information system:

conduct reconnaissance,

attempt social engineering,

scan the target, research,

execute target, cover tracks

attempt social engineering, conduct reconnaissance, scan target, research, cover tracks, execute target

conduct reconnaissance, scan the target, attempt social engineering, research, execute target, cover tracks

attempt social engineering, conduct reconnaissance, scan target, research, cover tracks, execute target

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Botnets are used to perform a which is designed to make a resource unavailable to its users.


brute force attack

dictionary attack

zero-day attack

denial of service attack

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Botnet also known as .

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the best defense against brute force attack ?

adware

patch

keylogger

monitoring system activity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Password cracking can used to help users recover forgotten password and to generate user ID.


TRUE

FALSE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of trial-and error method in brute force attack?

Guessing the password and user ID

Using a dictionary of common passwords
Using a random password generator

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?