Internet Security and History of Hacking Quiz

Internet Security and History of Hacking Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

Gears

Gears

12th Grade - Professional Development

10 Qs

International Trade Vocabulary

International Trade Vocabulary

University - Professional Development

12 Qs

UHY Break Ice Game

UHY Break Ice Game

Professional Development

10 Qs

CertELTD

CertELTD

Professional Development

10 Qs

Anatoly Borisovich Mariengof

Anatoly Borisovich Mariengof

9th Grade - Professional Development

10 Qs

Schools in NZ and NCEA

Schools in NZ and NCEA

Professional Development

11 Qs

Security vs. Safety

Security vs. Safety

Professional Development

10 Qs

DTP & E-Commerce

DTP & E-Commerce

Professional Development

10 Qs

Internet Security and History of Hacking Quiz

Internet Security and History of Hacking Quiz

Assessment

Quiz

English

Professional Development

Hard

Created by

Alla Alla

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

o     A _________ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

SSL

firewall

digital certificate

malware

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

___________ is a protocol used to establish encrypted links between a web server and a browser.

digital certificate

Secure Sockets Layer

malware

encryption

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A ______________ is used to verify the identity of a user or a website and to establish a secure connection.

digital certificate

firewall

DDoS attack

Certificate Authority

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

_________ is malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.

malware

virus

worm

DDoS attack

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A ______ requires user action to spread (e.g., opening an infected file), while a ______ can spread independently without user intervention

virus/worm

worm/virus

DDos attack/worm

worm/DDos attack

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

__________ is the process of converting data into a secret code to prevent unauthorized access.

encryption

decoding

phishing

hacking

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A Certificate Authority is an organization that issues _______________ and verifies the identity of the certificate holder

digital certificates

malware

viruses

worms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?