1) It means 'proving to be truth" or "confirmation" a) verification b) server c) details d) address 2) Hacker ............................the company's data. a) knock off her feet b) takes over c) embedded within d) wiped off 3) You need to fill in your............................before you get accapted. a) access b) fake c) credentials d) third party 4) The same meaning as surprised and shocked. a) eligibility b) fraudulent c) cracked d) knocked off her feet 5) The hacker gained ......................to her phone by cracking the password. a) access b) malware c) attachment d) install 6) The hacker is .................................... between the user and the computer. a) implement b) third party c) stored d) substantial 7) viruses are.............................the phone. I can't get rid of them. a) website b) network c) path d) embedded within 8) Hackers usually steal ..........................amount of money. a) sensitive b) malicious c) substantial d) eligibility 9) weak password is easy to be.......................... a) cracked b) verification c) receive d) address 10) to be safe, you should only download .............................files. a) unauthorized b) legitimate c) save d) phishing 11) when viruses ...........................a computer, it lags. a) suspicious b) unsecured c) source d) attack 12) It's the opposite of 'allowed to enter' a) unauthorized access b) wiped of c) enable d) prone to 13) It's a software that is designed to damage a computer system. a) credentials b) intercepted c) server d) malware 14) It's a file sent with a message. a) malicious b) cracked c) attachments d) fraudulent 15) weak phones systems are ............................to hacking. a) prone to b) website c) network d) take over 16) It's the same meaning as suspicious. a) data b) fishy c) unsecured d) intercepted 17) I have to be checked first for .........................before getting accepted for the job a) eligibility b) save c) implement d) third party 18) Same meaning as bad and awful. a) fraudulent b) source c) install d) malicious 19) .......................links are used to trick someone. a) embedded within b) malware c) fraudulent d) details
0%
English
공유
공유
공유
만든이
Hooryehobaid
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?