Créer une activité
Jouer Test
1. 
_____________ method of bypassing normal authentication, securing illegal remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected
A.
Backdoor
B.
Trapdoor
C.
phishing
D.
Social Engineering
2. 
Is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
A.
Cookiejacking
B.
BackDoor
C.
TrapDoor
D.
Phishing
3. 
_______is a system intended to enable online anonymity
A.
Thor
B.
Tor
C.
Zeus
D.
RedLine
4. 
Is mostly known as an attack vector for websites but can be used to attack any type of structured query language database
A.
RADIX64
B.
md5
C.
Sql injection
D.
Hijacking
5. 
Malware
A.
is software that is available for use at no cost or for an optional fee
B.
is software used or created by attackers to disrupt computer operatio
C.
software is software used to prevent, detect and remove badware
D.
a mechanism to produce the executable form of computer programs, such as machine code, in some automatic manner