1) Branch of cyber security a) Information security b) data 2) CIA Triad also known as a) Threats b) Confidentiality, Integrity, Availability 3) __________ is a path through which an attacker hacks your device a) Vulnerability b) Integrity 4) OTP a) One time password b) Our time password 5) FIR a) First investigation reports b) First individual report 6) ________ is a form of an illegal act where sensitive information such as passwords and credit card details a) Worm b) Phishing 7) DDoS a) Distributed denial of service b) Donot Disturb operating system 8) __________ is a computer program which runs on any computer system a) threats b) virus 9) __________ is a type of computer virus, but it works a bit differently than other viruses a) Malware b) Worm 10) ______ attack technique is used by an adversary to steal data from your system. a) Brute force b) Malware

class 8 computer science

リーダーボード

表示スタイル

オプション

テンプレートを切り替える

自動保存: を復元しますか?