Internet Security and History of Hacking Quiz

Internet Security and History of Hacking Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

Can / Can't - Apps / Programs

Can / Can't - Apps / Programs

Professional Development

10 Qs

Software Security

Software Security

University - Professional Development

10 Qs

Administration - vocabulary.

Administration - vocabulary.

Professional Development

10 Qs

Europass CV vocabulary

Europass CV vocabulary

Professional Development

15 Qs

BUTLER SCHOOL - VIDEO COMPREHENSION

BUTLER SCHOOL - VIDEO COMPREHENSION

Professional Development

11 Qs

INTENATIONAL TRADE DOCUMENTATION

INTENATIONAL TRADE DOCUMENTATION

Professional Development

11 Qs

Unit 2 revision

Unit 2 revision

10th Grade - Professional Development

16 Qs

Website Security Features.

Website Security Features.

Professional Development

11 Qs

Internet Security and History of Hacking Quiz

Internet Security and History of Hacking Quiz

Assessment

Quiz

English

Professional Development

Hard

Created by

Alla Alla

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

o     A _________ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

SSL

firewall

digital certificate

malware

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

___________ is a protocol used to establish encrypted links between a web server and a browser.

digital certificate

Secure Sockets Layer

malware

encryption

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A ______________ is used to verify the identity of a user or a website and to establish a secure connection.

digital certificate

firewall

DDoS attack

Certificate Authority

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

_________ is malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.

malware

virus

worm

DDoS attack

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A ______ requires user action to spread (e.g., opening an infected file), while a ______ can spread independently without user intervention

virus/worm

worm/virus

DDos attack/worm

worm/DDos attack

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

__________ is the process of converting data into a secret code to prevent unauthorized access.

encryption

decoding

phishing

hacking

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A Certificate Authority is an organization that issues _______________ and verifies the identity of the certificate holder

digital certificates

malware

viruses

worms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?