1) Branch of cyber security a) Information security b) data 2) CIA Triad also known as a) Threats b) Confidentiality, Integrity, Availability 3) __________ is a path through which an attacker hacks your device a) Vulnerability b) Integrity 4) OTP a) One time password b) Our time password 5) FIR a) First investigation reports b) First individual report 6) ________ is a form of an illegal act where sensitive information such as passwords and credit card details a) Worm b) Phishing 7) DDoS a) Distributed denial of service b) Donot Disturb operating system 8) __________ is a computer program which runs on any computer system a) threats b) virus 9) __________ is a type of computer virus, but it works a bit differently than other viruses a) Malware b) Worm 10) ______ attack technique is used by an adversary to steal data from your system. a) Brute force b) Malware

class 8 computer science

순위표

비주얼 스타일

옵션

템플릿 전환하기

자동 저장된 게임을 복구할까요?