cybersecurity basics

DOC 77 sahifa 251,0 KB Bepul yuklash

Sahifa ko'rinishi (5 sahifa)

Pastga aylantiring 👇
1 / 77
choose the best answer. security_______ crucial when you send confidential information online. ===== # is ===== am ===== are ===== being ++++ choose the best answer. malware ( malicious software) ________ programs designed to infiltrate or damage your computer. ===== # are ===== be ===== is ===== being ++++ choose the best answer. viruses, worms, trojans and spyware ________ malicious software. ===== # are ===== be ===== is ===== being ++++ choose the best answer. a virus ______ enter a pc via a disc drive. ===== # can ===== must ===== should ===== shall ++++ choose the best answer. spyware ________ information from your pc without your consent. ===== # collects ===== asks ===== please ===== work ++++ choose the best answer. a trojan horse is disguised as a useful ________. ===== # program ===== book ===== laptop ===== keyboard ++++ choose the best answer.worms are ___________programs that have capacity …
2 / 77
an be classified into___________. ===== #internal, external, human ===== human, medical, logical ===== internal, external, education ===== education, medical, logical ++++ choose the best answer: the non-physical threats can be commonly caused by ___________. ===== #malware ===== stationaries ===== knife ===== publicity ++++ choose the best answer: in order to keep your system data secure and safe, you should _________. ===== # timely scan your complete system ===== take your computer to the office ===== play games ===== hamper of the business operations ++++ choose the best answer: the cause of internal computer threat is __________. ===== #short circuit, fire, non-stable supply of power, hardware failure due to excess humidity, etc. ===== disasters such as floods, earthquakes, landscapes, etc. cause it. ===== destroying of infrastructure and/or hardware, thefts, disruption, and unintentional/intentional errors are among the threats. ===== hamper of the business operations ++++ choose the best answer: the cause of …
3 / 77
rity ===== users ++++ choose the best word to match the definition: having only letters and numbers. ===== #alphanumeric ===== password ===== security ===== network ++++ choose the best word to match the definition: people you work with. ===== #colleagues ===== password ===== security ===== network ++++ choose the best word to match the definition: letters, numbers, punctuation marks, etc. ===== #characters ===== password ===== security ===== network ++++ choose the best answer: _______are important for keeping the network secure. ===== #passwords ===== users ===== security ===== network ++++ choose the best answer: __________must be alphanumeric and be at least eight characters long. ===== #passwords ===== users ===== security ===== network ++++ choose the best answer: security is ___________, and these rules will keep us to keep out it systems and data secure. ===== #important ===== meaningless ===== secure ===== understand ++++ choose the best answer: i ________ during rush …
4 / 77
sor or it help desk about any damage, misuse, irregularities or security breaches. ===== #notify ===== read ===== spoke ===== fresh ++++ choose the best answer: keep current with ______software updates and patches. ===== #security ===== old ===== meaningless ===== freshness ++++ choose the best answer: follow office health and ________ standards. ===== #safety ===== old ===== meaningless ===== freshness ++++ choose the best answer: choose password that is ________ to guess. ===== #difficult ===== easy ===== meaningless ===== freshness ++++ choose the best answer: _______ your password every 9 weeks. ===== #change ===== give ===== take ===== help ++++ choose the best answer: _______ company official email software only. ===== #use ===== give ===== take ===== help ++++ choose the best answer: always _________ that you are sending your message to the right recipient. ===== #double check ===== translate ===== take ===== help ++++ choose the best answer: do …
5 / 77
the word wildlife. ==== #animals, birds and plants ==== rubbish ==== containing poison ==== damage or injure +++++ find the meaning of the word poisonous. ==== animals, birds and plants ==== rubbish ==== #containing poison ==== damage or injure +++++ find the meaning of the word survive. ==== animals, birds and plants ==== rubbish ==== #continue to live ==== damage or injure +++++ choose the correct answer. i would like _____ you and some of my other friends for dinner. ==== #to invite ==== inviting ==== invite ==== to be inviting +++++ choose the missing word. my big grey cat fluffy is good at _____ mice. ===== #catching ==== to catch ==== catches ==== catch ++++ fill in the gap with the right answer: i’m tired. let’s _______ at home. ==== #stay ==== to stay ==== staying ==== stayed ++++ which verb pattern is used in the sentence: i hope …

Ko'proq o'qimoqchimisiz?

Barcha 77 sahifani Telegram orqali bepul yuklab oling.

To'liq faylni yuklab olish

"cybersecurity basics" haqida

choose the best answer. security_______ crucial when you send confidential information online. ===== # is ===== am ===== are ===== being ++++ choose the best answer. malware ( malicious software) ________ programs designed to infiltrate or damage your computer. ===== # are ===== be ===== is ===== being ++++ choose the best answer. viruses, worms, trojans and spyware ________ malicious software. ===== # are ===== be ===== is ===== being ++++ choose the best answer. a virus ______ enter a pc via a disc drive. ===== # can ===== must ===== should ===== shall ++++ choose the best answer. spyware ________ information from your pc without your consent. ===== # collects ===== asks ===== please ===== work ++++ choose the …

Bu fayl DOC formatida 77 sahifadan iborat (251,0 KB). "cybersecurity basics"ni yuklab olish uchun chap tomondagi Telegram tugmasini bosing.

Teglar: cybersecurity basics DOC 77 sahifa Bepul yuklash Telegram