What is IT Security?, Designing websites, Protecting systems and data, Installing software, Fixing hardware, What does a Firewall do?, Speeds up internet, Stores data, Deletes files, Prevents unauthorized access, Which of the following is security software?, Calculator, Paint, Antivirus, Word processor, What is Malware?, Malicious software, Hardware device, Safe software, Network cable, What does an Email filter do?, Sends emails, Stores contacts, Deletes all emails, Blocks spam and harmful messages, What is Phishing?, Installing apps, Fixing systems, Fake messages to steal information, Cleaning viruses, What is Unauthorized Access?, Access without permission, Access with permission, Guest login, Public access, What is the difference between a Virus and a Worm?, Virus spreads automatically, Worm needs user action, Worm spreads automatically, Virus needs a file, Both are the same, Virus is safe, What does Authentication mean?, Verifying identity, Granting permissions, Blocking users, Tracking activity, What does Authorization mean?, Blocking attacks, Monitoring users, Verifying identity, Giving access rights, What does Accounting (AAA) do?, Gives access, Tracks user activity, Encrypts data, Verifies identity, Which is an example of Data Risk?, Strong password, Data backup, Loss of USB, Firewall, What is Identity Theft?, Encrypting files, Protecting data, Blocking malware, Stealing personal information, Which is a Physical Security method?, Biometrics, Firewall, Antivirus, Email filter, What is the purpose of Backup?, Increase speed, Block users, Restore data after loss, Delete data, What is Eavesdropping?, Intercepting private communication, Deleting files, Sending emails, Installing software, What is Hacking?, Fixing networks, Unauthorized access to systems, Data backup, Authorized access, What is Impersonation?, Monitoring users, Encrypting data, Pretending to be another user, Blocking attacks, What does Malware mean?, Safe software, Network tool, Hardware, Harmful software, What is a Virus?, Protects systems, Encrypts data, Attaches to files and spreads, Spreads automatically without files, What is a Worm?, Deletes files only, Is safe software, Needs user action to spread, Spreads automatically across networks, What is a Trojan?, A firewall, Appears as legitimate software, A virus that deletes files, A backup tool, What is Spyware?, Secretly collects information, Protects systems, Deletes viruses, Blocks access, What is an example of Unauthorized Use?, Using your own account, Updating software, Using another person’s username and password, Changing password, What is Manipulation in security?, Backing up data, Monitoring systems, Protecting data, Altering data illegally.
0%
Unit 05
Sdílet
Sdílet
Sdílet
podle
Salghamdi6
Upravit obsah
Tisk
Vložit
Více
Žebříček
Podívejte se na nejlepší hráče
Přiřazení
Výsledková tabule/Žebříček
Zobrazit více
Zobrazit méně
Tento žebříček je v současné době soukromý. Klikněte na
Share
chcete-li jej zveřejnit.
Tuto výsledkovou tabuli vypnul majitel zdroje.
Tento žebříček je zakázán, protože vaše možnosti jsou jiné než možnosti vlastníka zdroje.
Možnosti vrácení
Soutěžní pořad - kvíz
je otevřená šablona. Negeneruje skóre pro žebříček.
Vyžaduje se přihlášení.
Vizuální styl
Fonty
Je vyžadováno předplatné
Možnosti
AI vylepšená: Tato aktivita obsahuje obsah generovaný AI.
Víc se uč.
Přepnout šablonu
Zobrazit vše
Při přehrávání aktivity se zobrazí další formáty.
Žebříček
Podívejte se na nejlepší hráče
)
Otevřené výsledky
Kopírovat odkaz
QR kód
Odstranit
Obnovit automatické uložení:
?