What is IT Security?, Designing websites, Protecting systems and data, Installing software, Fixing hardware, What does a Firewall do?, Speeds up internet, Stores data, Deletes files, Prevents unauthorized access, Which of the following is security software?, Calculator, Paint, Antivirus, Word processor, What is Malware?, Malicious software, Hardware device, Safe software, Network cable, What does an Email filter do?, Sends emails, Stores contacts, Deletes all emails, Blocks spam and harmful messages, What is Phishing?, Installing apps, Fixing systems, Fake messages to steal information, Cleaning viruses, What is Unauthorized Access?, Access without permission, Access with permission, Guest login, Public access, What is the difference between a Virus and a Worm?, Virus spreads automatically, Worm needs user action, Worm spreads automatically, Virus needs a file, Both are the same, Virus is safe, What does Authentication mean?, Verifying identity, Granting permissions, Blocking users, Tracking activity, What does Authorization mean?, Blocking attacks, Monitoring users, Verifying identity, Giving access rights, What does Accounting (AAA) do?, Gives access, Tracks user activity, Encrypts data, Verifies identity, Which is an example of Data Risk?, Strong password, Data backup, Loss of USB, Firewall, What is Identity Theft?, Encrypting files, Protecting data, Blocking malware, Stealing personal information, Which is a Physical Security method?, Biometrics, Firewall, Antivirus, Email filter, What is the purpose of Backup?, Increase speed, Block users, Restore data after loss, Delete data, What is Eavesdropping?, Intercepting private communication, Deleting files, Sending emails, Installing software, What is Hacking?, Fixing networks, Unauthorized access to systems, Data backup, Authorized access, What is Impersonation?, Monitoring users, Encrypting data, Pretending to be another user, Blocking attacks, What does Malware mean?, Safe software, Network tool, Hardware, Harmful software, What is a Virus?, Protects systems, Encrypts data, Attaches to files and spreads, Spreads automatically without files, What is a Worm?, Deletes files only, Is safe software, Needs user action to spread, Spreads automatically across networks, What is a Trojan?, A firewall, Appears as legitimate software, A virus that deletes files, A backup tool, What is Spyware?, Secretly collects information, Protects systems, Deletes viruses, Blocks access, What is an example of Unauthorized Use?, Using your own account, Updating software, Using another person’s username and password, Changing password, What is Manipulation in security?, Backing up data, Monitoring systems, Protecting data, Altering data illegally.
0%
Unit 05
Del
Del
Del
af
Salghamdi6
Rediger indhold
Trykke
Integrere
Mere
Rangliste
Se topspillere
Tildelinger
Rangliste
Vis mere
Vis mindre
Denne rangliste er i øjeblikket privat. Klik på
Del
for at gøre det offentligt.
Denne rangliste er deaktiveret af ressourceejeren.
Denne rangliste er deaktiveret, da dine muligheder er forskellige fra ressourceejerens.
Indstillinger for gendannelse
Gameshow quiz
er en åben skabelon. Det genererer ikke resultater for en rangliste.
Log ind påkrævet
Visuel stil
Skrifttyper
Kræver abonnement
Indstillinger
AI-forstærket: Denne aktivitet indeholder indhold genereret af AI.
Lær mere.
Skift skabelon
Vis alle
Der vises flere formater, mens du afspiller aktiviteten.
Rangliste
Se topspillere
)
Åbne resultater
Kopiér link
QR-kode
Slette
Gendan automatisk gemt:
?