1) Branch of cyber security a) Information security b) data 2) CIA Triad also known as a) Threats b) Confidentiality, Integrity, Availability 3) __________ is a path through which an attacker hacks your device a) Vulnerability b) Integrity 4) OTP a) One time password b) Our time password 5) FIR a) First investigation reports b) First individual report 6) ________ is a form of an illegal act where sensitive information such as passwords and credit card details a) Worm b) Phishing 7) DDoS a) Distributed denial of service b) Donot Disturb operating system 8) __________ is a computer program which runs on any computer system a) threats b) virus 9) __________ is a type of computer virus, but it works a bit differently than other viruses a) Malware b) Worm 10) ______ attack technique is used by an adversary to steal data from your system. a) Brute force b) Malware

class 8 computer science

Bestenliste

Visueller Stil

Einstellungen

Vorlage ändern

Soll die automatisch gespeicherte Aktivität wiederhergestellt werden?