Discover Computer Security

Introduksjon til datasikkerhet
5 questions
Cybercrime and Malware
12 questions
Malicious Software and Cybercrime
38 questions
Data Encryption Standard (DES)
10 questions

Data Encryption Standard (DES)

UndisputableBalalaika avatar
UndisputableBalalaika
Szyfrowanie - metody i techniki
30 questions
Networking and Folder Sharing
25 questions

Networking and Folder Sharing

ArtisticPraseodymium avatar
ArtisticPraseodymium
Operating System Components
30 questions

Operating System Components

GodlikeRhodochrosite avatar
GodlikeRhodochrosite
Digital Forensics and Cybercrime
10 questions
Ransomware Attack Vectors
1 questions

Ransomware Attack Vectors

FlawlessPennywhistle avatar
FlawlessPennywhistle
Criptografia Pública e Chaves
18 questions
Windows Forensics Module 5
5 questions

Windows Forensics Module 5

WarmheartedFlashback avatar
WarmheartedFlashback
DEF CON Hacker Convention
16 questions
Digital Signature Schemes
24 questions
Cryptography Chapter 8
8 questions
Cyber Crime and Cyber Terrorism
10 questions
Zero-Day Exploits and Cybersecurity
10 questions
Kerberos Protocol Quiz
15 questions

Kerberos Protocol Quiz

SelfSufficientVerisimilitude avatar
SelfSufficientVerisimilitude
DES Encryption Algorithm
40 questions
Antivirus Policy and Threat Detection
10 questions
Introduction to Cryptography
12 questions
Cyber Intelligence Process
40 questions
Seguridad Cibernética
8 questions
Introduction to Cryptography
16 questions

Introduction to Cryptography

ProvenLaboradite6735 avatar
ProvenLaboradite6735
Types of Virus Protection
0 questions

Types of Virus Protection

CostEffectiveLeaningTowerOfPisa avatar
CostEffectiveLeaningTowerOfPisa
Updating MacOS Guide
18 questions
Cyber Attacks and Threats
25 questions
Use Quizgecko on...
Browser
Browser