Cyber Security Vocabulary (Set 3)

Cyber Security Vocabulary (Set 3)

10 Qs

quiz-placeholder

Similar activities

AACOSE 7

AACOSE 7

University

11 Qs

Level 1 - Software/OS Quiz

Level 1 - Software/OS Quiz

KG - University

9 Qs

Internet Basics Unit Quiz Review

Internet Basics Unit Quiz Review

6th Grade

10 Qs

Synergy quiz

Synergy quiz

KG - University

13 Qs

Electronic Communication & Scheduling Unit Review

Electronic Communication & Scheduling Unit Review

KG - University

10 Qs

Hardware or Software Quiz

Hardware or Software Quiz

KG - University

15 Qs

Spring Test 2024 for Class V  Form

Spring Test 2024 for Class V Form

KG - University

11 Qs

Cyber Security Vocabulary (Set 3)

Cyber Security Vocabulary (Set 3)

Assessment

Quiz

others

Medium

Created by

CHANCY ZAHRT

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system in which all computer programs and data is stored on a central server.
Data Table
Server
Software
Cloud Computing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Programs and other operating information used by a computer.
hardware
software
cloud computer
IP address

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A number that uniquely identifies each computer or device connected to the Internet.
Coding
Server
Software
IP Address

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Program that hides in a computer and allows someone from a remote location to take full control of the computer.
Rootkit
Hacker
Cloud Computer
Software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The practice of allowing users to use their own personal devices to connect to an organizational network.
Software
BYOD
Servers
RootKit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the computer systems of an organization are deliberately attacked to find any weaknesses
Hackers
Pen Testing
Rootkit
Social Engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hackers use their social skills to trick people into revealing access credentials or other valuable information.
Rootkit
Pen Testing
social engineering
Clickjacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for others