IT security and safity

IT security and safity

Do you think you're smart? Taste! 😉

Imagem de perfil user: Luiza Rocha
Luiza Rocha
1

A man-in-the-middle (MITM) attack involves one actor positioning itself between a party to intercept and use data maliciously.

True
False
2

Is the Honeypot technique intended to deflect hackers?

False
True
3

A Data Breach attack occurs when a hacker successfully attacks a company.

False
True
4

What does a Firewall do?

monitors outgoing traffic
monitors incoming traffic
monitors incoming and outgoing traffic
none of the alternatives
5

Which term is short for "malicious software"?

Malware
None of the dealternatives.
Spyware
Firewall
6

The word "botnet" is a combination of which words?

Network and autobot
Internet and autobot
Internet and robot
Network and robot
Quizur Logo

Siga nossas redes sociais:

Incorporar

Para incorporar este quiz ao seu site copie e cole o código abaixo.