What is IT Security?, Designing websites, Protecting systems and data, Installing software, Fixing hardware, What does a Firewall do?, Speeds up internet, Stores data, Deletes files, Prevents unauthorized access, Which of the following is security software?, Calculator, Paint, Antivirus, Word processor, What is Malware?, Malicious software, Hardware device, Safe software, Network cable, What does an Email filter do?, Sends emails, Stores contacts, Deletes all emails, Blocks spam and harmful messages, What is Phishing?, Installing apps, Fixing systems, Fake messages to steal information, Cleaning viruses, What is Unauthorized Access?, Access without permission, Access with permission, Guest login, Public access, What is the difference between a Virus and a Worm?, Virus spreads automatically, Worm needs user action, Worm spreads automatically, Virus needs a file, Both are the same, Virus is safe, What does Authentication mean?, Verifying identity, Granting permissions, Blocking users, Tracking activity, What does Authorization mean?, Blocking attacks, Monitoring users, Verifying identity, Giving access rights, What does Accounting (AAA) do?, Gives access, Tracks user activity, Encrypts data, Verifies identity, Which is an example of Data Risk?, Strong password, Data backup, Loss of USB, Firewall, What is Identity Theft?, Encrypting files, Protecting data, Blocking malware, Stealing personal information, Which is a Physical Security method?, Biometrics, Firewall, Antivirus, Email filter, What is the purpose of Backup?, Increase speed, Block users, Restore data after loss, Delete data, What is Eavesdropping?, Intercepting private communication, Deleting files, Sending emails, Installing software, What is Hacking?, Fixing networks, Unauthorized access to systems, Data backup, Authorized access, What is Impersonation?, Monitoring users, Encrypting data, Pretending to be another user, Blocking attacks, What does Malware mean?, Safe software, Network tool, Hardware, Harmful software, What is a Virus?, Protects systems, Encrypts data, Attaches to files and spreads, Spreads automatically without files, What is a Worm?, Deletes files only, Is safe software, Needs user action to spread, Spreads automatically across networks, What is a Trojan?, A firewall, Appears as legitimate software, A virus that deletes files, A backup tool, What is Spyware?, Secretly collects information, Protects systems, Deletes viruses, Blocks access, What is an example of Unauthorized Use?, Using your own account, Updating software, Using another person’s username and password, Changing password, What is Manipulation in security?, Backing up data, Monitoring systems, Protecting data, Altering data illegally.
0%
Unit 05
Udostępnij
Udostępnij
Udostępnij
autor:
Salghamdi6
Edytuj elementy
Drukuj
Osadź
Więcej
Tabela wyników
Zobacz najlepszych zawodników
Zadania
Tabela rankingowa
Pokaż więcej
Pokaż mniej
Ta tabela rankingowa jest obecnie prywatna. Kliknij przycisk
Udostępnij
, aby ją upublicznić.
Ta tabela rankingowa została wyłączona przez właściciela materiału.
Ta tabela rankingowa została wyłączona, ponieważ Twoje opcje różnią się od opcji właściciela materiału.
Przywróć poprzednie opcje
Teleturniej
jest szablonem otwartym. Nie generuje wyników w tabeli rankingowej.
Wymagane logowanie
Motyw
Czcionki
Wymagany abonament
Opcje
AI Enhanced: Ta aktywność zawiera treści generowane przez AI.
Dowiedz się więcej.
Zmień szablon
Pokaż wszystko
Więcej formatów pojawi się podczas wykonywania ćwiczenia.
Tabela wyników
Zobacz najlepszych zawodników
)
Otwórz wyniki
Kopiuj link
Kod QR
Usuń
Przywrócić automatycznie zapisane ćwiczenie:
?