
Cyber Security Vocabulary (Set 3)
Authored by CHANCY ZAHRT
others
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A system in which all computer programs and data is stored on a central server.
Data Table
Server
Software
Cloud Computing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Programs and other operating information used by a computer.
hardware
software
cloud computer
IP address
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A number that uniquely identifies each computer or device connected to the Internet.
Coding
Server
Software
IP Address
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Program that hides in a computer and allows someone from a remote location to take full control of the computer.
Rootkit
Hacker
Cloud Computer
Software
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The practice of allowing users to use their own personal devices to connect to an organizational network.
Software
BYOD
Servers
RootKit
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When the computer systems of an organization are deliberately attacked to find any weaknesses
Hackers
Pen Testing
Rootkit
Social Engineering
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hackers use their social skills to trick people into revealing access credentials or other valuable information.
Rootkit
Pen Testing
social engineering
Clickjacking
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?