ITE305 [DAY04 - DAY05]

ITE305 [DAY04 - DAY05]

University

20 Qs

quiz-placeholder

Similar activities

Soal Informatika IBS

Soal Informatika IBS

3rd Grade - University

23 Qs

SecOps Quiz

SecOps Quiz

University

16 Qs

J277 - 1.4 - Network Threats

J277 - 1.4 - Network Threats

10th Grade - University

16 Qs

IT Ethics, impact and security

IT Ethics, impact and security

University

16 Qs

Examen Capitulo 2 - Cybersecurity Essentials

Examen Capitulo 2 - Cybersecurity Essentials

University

20 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

Quiz Unidad I - IEI-076 - Hacking Ético

Quiz Unidad I - IEI-076 - Hacking Ético

University

22 Qs

ICT Cybersecurity Essentials

ICT Cybersecurity Essentials

10th Grade - University

25 Qs

ITE305 [DAY04 - DAY05]

ITE305 [DAY04 - DAY05]

Assessment

Quiz

Computers

University

Medium

Created by

Veronica Canlas

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following phrases describe an attack?

A malicious codebeing executed

A known weakness of the system

An activity of compromising a controlled system

An unauthorized access to the system

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a task of a Black Hat Hacker?

He tests system vunerabilities.

They work for the government.

They hack for personal enjoyment.

They acquire unauthorized access for personal gain.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The back door concept in information security means ____.

A known or unknown access mechanism

A type of malicious code

A password protection key

A physical entrance to a secure facility

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When is hacking considered ethical?

It is always considered ethical.

Only when it benefits the hacker.

Only when permission is granted, and rules are followed.

It is never ethical.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Brute force attack is about ____.

modifying packet headers on a network

gaining unauthorized password access

spreading viruses to computer systems

sending unlimited mails to usrs

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which type of hacker is known for ethical hacking and is often hired to identify system vulnerabilities?

White Hat Hackers

Black Hat Hackers

Grey Hat Hackers

Red Hat Hackers

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A type of hacker that switches between being good and bad.

White Hat Hackers

Black Hat Hackers

Grey Hat Hackers

Red Hat Hackers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?