Hacking cracking security Solved MCQs

New mcq

No collections found!

Viruses, worms, and trojans are common security threats that are often used in spreading. What is the name for them all?
icon 1 answers
icon41 Views
icon0 Likes
What should a strong password include?
icon 1 answers
icon41 Views
icon0 Likes
Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access
icon 1 answers
icon42 Views
icon0 Likes
______________ is way of protecting internet-connected systems, including: hardware, software and data, from cyberattacks
icon 1 answers
icon37 Views
icon0 Likes
If a website is using HTTPS it means that
icon 1 answers
icon39 Views
icon0 Likes
What do we use a SPAM filter for?
icon 1 answers
icon47 Views
icon0 Likes
Qwerty123 is a Strong Password (i.e. not a cyber security risk)
icon 1 answers
icon43 Views
icon0 Likes
Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe?
icon 1 answers
icon33 Views
icon0 Likes
Who was the latest victim of cyber crime
icon 1 answers
icon41 Views
icon0 Likes