Zusammenfassung der Ressource
Frage 1
Frage
Select 3 different types of Hacking from the list below
Antworten
-
Black Hat Hacking
-
White Hat Hacking
-
Blue Hat Hacking
-
Grey Hat Hacking
-
Orange Hat Hacking
-
Pink Hat Hacking
Frage 2
Frage
Which type of Hacking from your answers is legal?
Antworten
-
White Hat Hacking
-
Black Hat Hacking
-
Grey Hat Hacking
Frage 3
Frage
Is it necessary to spend money on protecting data and information
Frage 4
Frage
Data is threatened by many different kinds of attack such as [blank_start]DDoS Attacks[blank_end] or [blank_start]Malware[blank_end].
Frage 5
Frage
Choose the correct answer from the list below
Antworten
-
Viruses can begin to release payloads without a trigger
-
Malware is free software designed to help people to use their PC more efficiently
-
Botnets are a network of PC systems all being controlled by one Master system
-
Passwords can only be used on a payment subscription service
Frage 6
Frage
You can access a PC by logging in using the correct username and password for an account
Frage 7
Frage
Select the 2 correct answers
Antworten
-
Social Engineering is a physical threat to data, not usually performed within a PC itself
-
Malware is readily available for anyone to access at any time
-
Data is a useless commodity with unexplained value
-
Phishing is a scam involving your local supermarket