Back to home
  • Crossword

    Play now
  • Quiz

    Play now
3
2
5
3
4
4
1
1
2
5
 
Down
  • A distinct subnet under the control of an organization or an individual.
  • Administering computer generated messages.
  • A sophisticated strain of Windows ransomware.
  • Barrier between the internal and external networks.
  • A technique of isolating processes and browser tabs from one another and the rest of the computer.
Right
  • A device or node that communicates back and forth with a network to which it is connected.
  • A software that replicates itself by modifying other computer programs.
  • A logging standard developed by Eric Allman.
  • ______ happens when an unauthorized user accesses the network.
  • An open source application used by attackers.
View answer

Choose the correct answer

Q:1 x

The below logic is an example of which cyber-attack that targets the vulnerabilities on the databases?

‘ OR ‘1’=’1′ — ‘ OR ‘1’=’1′ { ‘ OR ‘1’=’1′ /*

Next
1/10

Choose the correct answer

Q:2x

What was the name of the first computer virus?

Next
2/10

Choose the correct answer

Q:3x

Which OS was written based on Knoppix by Kali Linux?

Next
3/10

Choose the correct answer

Q:4x

Who coined the term Virus?

Next
4/10

Choose the correct answer

Q:5x

A virus that migrates freely within a large population of unauthorized email users is known as _____?

Next
5/10

Choose the correct answer

Q:6x

Keylogger is a type of _____?

Next
6/10

Choose the correct answer

Q:7x

Name the process of altering the data so that it is not used unless the changes are undone.

Next
7/10

Choose the correct answer

Q:8x

Code Red is an example of _____?

Next
8/10

Choose the correct answer

Q:9x

_____ is a computer security venture that gives data about security vulnerabilities and helps in penetration testing and IDS signature advancement.

Next
9/10

Choose the correct answer

Q:10x

What does DDoS stand for?

Next
10/10
x

Final Step

Gold, silver, or bronze!?

  • By clicking 'Know your score', you agree to processing of personal data according to the Privacy Policy.
x

Score

You have got out of 10

Stronger security starts with Log360

ManageEngine Log360 help strengthen your defense against cyberattacks, data breaches, and identity thefts.

Try Log360
Answer key
x

Answer Key

1. The below logic is an example of which cyber-attack that targets the vulnerabilities on the databases?

Your Answer:

Correct Answer: SQL injection

2. What was the name of the first computer virus?

Your Answer:

Correct Answer: Creeper system

3. Which OS was written based on Knoppix by Kali Linux?

Your Answer:

Correct Answer: Backtrack

4. Who coined the term Virus?

Your Answer:

Correct Answer: Len Adleman

5. A virus that migrates freely within a large population of unauthorized email users is known as _____?

Your Answer:

Correct Answer: Macro

6. Keylogger is a type of _____?

Your Answer:

Correct Answer: Spyware

7. Name the process of altering the data so that it is not used unless the changes are undone.

Your Answer:

Correct Answer: Encryption

8. Code Red is an example of _____?

Your Answer:

Correct Answer: Virus

9. _____ is a computer security venture that gives data about security vulnerabilities and helps in penetration testing and IDS signature advancement.

Your Answer:

Correct Answer: Virus

10. What does DDoS stand for?

Your Answer:

Correct Answer: Virus

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.

Thank you for your interest!

View answer

  • Please enter business email only.
    Please enter business email address
  •  
    By clicking 'Submit', you agree to processing of personal data according to the Privacy Policy