Search Header Logo

Network Security

Authored by يسرا التجاني

Computers

12th Grade

Used 5+ times

Network Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Uses a number of computers over a network of infected machines which send req uests to a website which would bring it offline

SQL

DoS

WLAN

USB

2.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Data travels across networks in

Nibbles

Parts

Bytes

Packets

3.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

How do hackers use viruses?

To make a computer unusable

To get someone’s personal information

To find out card details

All of the above

4.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What must a user need to decrypt a file?

Coin

Key

Token

Graph

5.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is encryption?

Where only the sender and recipient can read the message.

A method of bypassing viruses

A form of anti-virus

Where data is translated into code so that only authorised users, or users with the key can decrypt it.

6.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Software that performs a ‘barrier’ between a potential attacker and the computer system.

Antivirus

Firewall

Windows update

Disk defragmenter

7.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Sending requests to a single server using hijacked machines

Phishing

DoS

Worms

Virus

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?