Network Threats

Network Threats

9th - 12th Grade

16 Qs

quiz-placeholder

Similar activities

Ulangan Harian - Jaringan Komputer & Analisis Data

Ulangan Harian - Jaringan Komputer & Analisis Data

10th Grade

20 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

Input Device

Input Device

9th - 10th Grade

16 Qs

Conditions

Conditions

8th - 10th Grade

16 Qs

Creative iMedia: Strengths, Weaknesses and Improvements

Creative iMedia: Strengths, Weaknesses and Improvements

10th Grade

11 Qs

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

10th - 12th Grade

20 Qs

X.K Bab 5 Jaringan Komputer dan Internet

X.K Bab 5 Jaringan Komputer dan Internet

10th Grade

20 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

Network Threats

Network Threats

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Andre Wallace

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an active attack?

Timed attacks

Tantrum attacks

Monitor attack

Intercepting attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passive Attacks include methods such as

Malware

System data

Sniffers

Storage locks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network attacks are all of the following EXCEPT

Denial of Service

Brute Force

Insider

Espionage

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A Denial of Service attack is where a hacker stops users from accessing part of a ____________

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

DoS mostly include the flooding of the network with useless __________

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ monitors user actions

Rootkits

Spyware

Scareware

Locking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rootkits:

monitor user actions

modifies and deletes files

alters permissions giving perpetrators administrative access

ecrypts all the computer files then demands money

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?