PREMIUM LOGIN

ClassTools Premium membership gives access to all templates, no advertisements, personal branding and many other benefits!
 

Username:    
Password:    
Submit Cancel

 

Not a member?

JOIN NOW!

 
New EditShare

Seberapa Advance Anda?

Drag and Drop the items in the right-hand column into the correct order. You can also create your own | view a sample.

  • Black-box Pentester
  • Watering-hole Attack
  • Hoax
  • Ransomware
  • Script Kiddie
  • DNS Poisoning
  • SQL Injection
  • Near field communication
  • Political cause
  • Buffer overflow
  • Input validation
  • Spear phishing
  • Pasive reconnaissance
  • Dumpster diving
  • Resource exhaustion
  • Shoulder surfing
  • Keylogger
  • Default configuration
  • Adware
  • Rootkit
  • Whaling
  • Competitor
  • Kerberos
  • Zero-day virus
  • Intrusive scan
  • You have to reinstalled the operating system, but this virus is still there
  • Obtains a program from the dark web
  • Prevents SQL injection, buffer overflow, and integer overflow
  • An email sent to the Board of Directors
  • Purchasing fake software from a website
  • Someone willing to steal your trade secrets
  • No knowledge or information is given to you
  • The first stage after purchasing an IoT device, change the ...
  • Complete wireless payment transactions
  • The trial software found exploits, but you need to buy the full package
  • Redirects the user to a fraudulent website
  • An attack on the CEO or a high‐level executive
  • More data is inserted into an application than expected
  • The reason why we shred and burn data is to prevent ...
  • May cause harm to your system
  • Hacktivist motivation
  • Someone standing behind you records your ATM transaction by using a smartphone
  • An attack using the phrase 1=1
  • An attack on everyone using a popular trusted website
  • Prevents pass-the-hash attacks
  • This generates multiple popups
  • An untraceable virus
  • Listening to a conversation
  • CPU running at 100% is a sign of …
  • A USB drive plugged into the back of your desktop logs keystrokes