Search Header Logo

ITE305 [DAY04 - DAY05]

Authored by Veronica Canlas

Computers

University

Used 3+ times

ITE305 [DAY04 - DAY05]
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following phrases describe an attack?

A malicious codebeing executed

A known weakness of the system

An activity of compromising a controlled system

An unauthorized access to the system

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a task of a Black Hat Hacker?

He tests system vunerabilities.

They work for the government.

They hack for personal enjoyment.

They acquire unauthorized access for personal gain.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The back door concept in information security means ____.

A known or unknown access mechanism

A type of malicious code

A password protection key

A physical entrance to a secure facility

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When is hacking considered ethical?

It is always considered ethical.

Only when it benefits the hacker.

Only when permission is granted, and rules are followed.

It is never ethical.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Brute force attack is about ____.

modifying packet headers on a network

gaining unauthorized password access

spreading viruses to computer systems

sending unlimited mails to usrs

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which type of hacker is known for ethical hacking and is often hired to identify system vulnerabilities?

White Hat Hackers

Black Hat Hackers

Grey Hat Hackers

Red Hat Hackers

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A type of hacker that switches between being good and bad.

White Hat Hackers

Black Hat Hackers

Grey Hat Hackers

Red Hat Hackers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?