1) A set of rules that state how things should be presented. a) RANSOMWARE b) HOUSE STYLE c) GOOGLE d) SHOULDER SURFING 2) What people think about based on your online activity a) ONLINE REPUTATION b) PASSWORDS c) SOCIAL ENGINEERING d) CYBER SECURITY 3) a search engine a) SOCIAL ENGINEERING b) BLAGGING c) GOOGLE d) HOUSE STYLE 4) The protection of information systems from theft or damage a) SPYWARE b) SOCIAL ENGINEERING c) CYBER SECURITY d) RANSOMWARE 5) What is Malware short for? a) ONLINE REPUTATION b) KEYLOGGER c) Malicious Code d) SHOULDER SURFING 6) Tricking someone into giving you their details. a) SOCIAL ENGINEERING b) KEYLOGGER c) GOOGLE d) RANSOMWARE 7) Spreads through a computer, stopping things working. a) GOOGLE b) PASSWORDS c) VIRUS d) RANSOMWARE 8) Looking at what you are doing on a computer. a) KEYLOGGER b) PHISHING c) SOCIAL ENGINEERING d) SPYWARE 9) Can see what you are typing a) KEYLOGGER b) Malicious Code c) BLAGGING d) RANSOMWARE 10) Asking for money to get your system back. a) RANSOMWARE b) VIRUS c) PHARMING d) BLAGGING 11) Used to protect your accounts. a) PASSWORDS b) SOCIAL ENGINEERING c) ONLINE REPUTATION d) BLAGGING 12) Making up a fake story to get someones information. a) PHISHING b) VIRUS c) GOOGLE d) BLAGGING 13) Sending emails and text messages with malicious links. a) GOOGLE b) SPYWARE c) PHISHING d) PHARMING 14) Creating fake login pages or websites for people to enter their username and password. a) PASSWORDS b) PHARMING c) ONLINE REPUTATION d) PHISHING 15) Looking over someones shoulder to get their pin. a) SHOULDER SURFING b) RANSOMWARE c) CYBER SECURITY d) PHARMING 16) A way of authenticaton is........ a) Biometrics b) Firewalls c) Encryption d) IP Address 17) An example of an IP address is......... a) 192.36.14.256 b) 192.36.14.1 c) AA.BB.CC.DD d) A4-5B-6F-1A-44-FF 18) An example of a MAC address is......... a) 192.36.14.256 b) 192.36.14.1 c) AA.BB.CC.DD d) A4-5B-6F-1A-44-FF 19) A MAC address is used to uniquely identify a device on a network. a) True b) False 20) The process of scrambling data so that only someone with the code or key can read it. a) Authentication b) Firewall c) Encryption d) IP address 21) A username, smart cards, face ID and CAPTCHA are all methods of....... a) Firewalls b) Authentication c) IP addresses d) Encryption
0%
CYBER SECURITY
공유
공유
공유
만든이
Mrdoskocz
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?