Which of the following describes a name generator attack?, Software used to randomly create accounts that post to social media, Attackers create an online quiz to produce a name; the answers to the quiz find out key pieces of information that can help them to answer the security questions protecting people's accounts, An attack that makes multiple attempts to guess a username and password, A form of identity theft conducted online, Gaining unauthorised access to or control of a computer system’ is a definition of which type of cybercrime?, Hacking, Viruses, Social engineering, Phishing, What is the term for people who are paid to legally hack into computer systems with the sole purpose of helping a company identify weaknesses in their systems, Ethical hackers, Legal hackers, Penetration testers (pen testers), System administrators, What is the purpose of a DDoS attack?, To use multiple computers to flood a network or server with internet traffic in order to disrupt service, To use a single computer to flood a network or server with internet traffic in order to disrupt service, To use multiple computers to infiltrate a network in order to steal data or to plant a virus, To use a single computer to infiltrate a network in order to steal data or to plant a virus, Which of the following passwords would be the best defence against a brute force attack?, peter1£@!, Petertherabbit, P3tertherabb1t, P$tertherabb1t, Which one of the following UK laws would a DDoS attack violate?, The Freedom of Information Act, The Computer Misuse Act, The Data Protection Act, The Copyright, Designs, and Patents Act.
0%
Cybersecurity
공유
공유
공유
만든이
Juliavale
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
게임쇼 퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
)
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?