Search Header Logo
Yr8 Cybersecurity L3 & L4 Homework

Yr8 Cybersecurity L3 & L4 Homework

Assessment

Presentation

•

Computers

•

6th - 8th Grade

•

Medium

Created by

A Williams

Used 4+ times

FREE Resource

55 Slides • 24 Questions

1

media

2

media

3

Multiple Choice

You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found.

Which of the following technical password attacks are you using?

1

Brute Force attack

2

Password Sniffing

3

Key logger

4

Pass-the-hash attack

4

media

5

media

6

Multiple Choice

Which of the following is a characteristic of a brute force attack?

1

It uses social engineering to deceive users.

2

It involves guessing passwords by trying many combinations.

3

It spreads through email attachments.

4

It encrypts files and demands a ransom.

7

media

8

Multiple Choice

What is a brute-force attack?

1

An attack that involves overwhelming a network with traffic

2

An attack that involves trying all possible password combinations

3

An attack that involves sending phishing emails

4

An attack that involves installing spyware

9

Multiple Choice

Question image
'Brute Force' attacks consist of...
1
Hitting the computer hard
2
Hitting a computer programmer
3
Guessing a password repeatedly
4
Destroying files

10

Multiple Select

How do you make a login secure? (Multiple choice)

1

A combination capital letter, number and symbols/special charatcters

2

Using a phrase like "iloveManU"

3

Enabling 2 factor authentication

4

using password as a password

11

media

12

Multiple Choice

Which statement best describes a brute force attack?
1
Using social engineering to trick users
2
Trying every possible password combination until the correct one is found
3
Exploiting software vulnerabilities
4
Sending phishing emails

13

media

14

media

15

media

16

media

17

media

18

media

19

media

20

Multiple Choice

What is this called:

Attempting to gain access to, or control of, a computer system without permission.​

1

Ethical Hacking

2

Unethical hacking

21

Multiple Choice

What is this called:

Attempting to gain access to, or control of, a computer system with permission, to identify weaknesses and fix them

1

Ethical Hacking

2

Unethical hacking

22

media

23

media

24

media

25

media

26

media

27

media

28

media

29

media

30

media

31

Multiple Choice

Which of the following best describes a Distributed Denial of Service (DDoS) attack?

1

An attempt by a country to deny its citizens access to the Internet

2

An attempt to deny users access to a Web site’s resources by flooding the Web site with requests from multiple systems

3

An attempt by one user to deny service to another user by posting material on a social network

4

An attempt by a user of the Internet to get private information from a secure database

32

media

33

Multiple Choice

Describe how online services can be disrupted by a DDoS attack.

1

By blocking access to the website

2

By sending multiple requests from one computer

3

By using multiple computers to send requests

4

By making the website faster

34

media

35

Multiple Choice

What is the difference between DoS and DDoS attacks?

1

DoS involves one attacker and one target

2

DDoS involves multiple attackers and one target

3

DoS is more harmful than DDoS

4

DDoS is easier to execute than DoS

36

Multiple Choice

What does DDOS stand for?

1

Denial Data Operation System

2

Domain Data Overwrite Service

3

Distributed Domain Or Service

4

Distributed Denial Of Service

37

Multiple Choice

What does a DoS and DDoS attack aim to do?

1

Get a virus onto a computer

2

Detect and Defend online System

3

Disrupt online services by flooding a server with lots of requests

4

Hack into a file server to locate confidential information and extract it

38

Multiple Choice

What is the main purpose of a Distributed Denial of Service (DDoS) attack?
1
To steal passwords
2
To flood a network or server with traffic and disrupt service
3
To encrypt files for ransom
4
To install malware on a system

39

Multiple Choice

What is the key difference between a DoS and a DDoS attack?
1
DoS uses multiple attackers; DDoS uses one attacker
2
DoS is legal; DDoS is illegal
3
DoS has one attacker; DDoS has multiple attackers
4
DoS is faster than DDoS

40

media

41

media

42

media

43

media

44

media

45

media

46

media

47

Multiple Choice

Access a computer without permission (hacking) is in breach of the...

1

Communications Act

2

Data Protection Act

3

Computer Misuse Act

48

media

49

media

50

media

51

media

52

media

53

media

54

Multiple Choice

How does a computer virus typically infect a device?
1
By spreading automatically through a network
2
By being executed from an infected file, download, or program
3
By encrypting files and demanding payment
4
By disguising itself as a harmless update

55

media

56

Multiple Choice

How does a worm usually spread to other devices?
1
Through user execution of an infected file
2
By attaching itself to other programs
3
By exploiting network connections to replicate across devices
4
By hiding inside a game or movie

57

media

58

Multiple Choice

What does ransomware typically do?
1
Deletes all files without warning
2
Encrypts files and demands payment to unlock them
3
Slows down the network by consuming bandwidth
4
Creates fake social media accounts

59

media

60

Multiple Choice

Why is a Trojan considered dangerous?
1
It spreads automatically through networks
2
It hides inside another program and can open a backdoor for attackers
3
It replicates by attaching to files
4
It displays unwanted advertisements

61

media

62

Multiple Choice

Which of the following is a characteristic of spyware?
1
Encrypts files and demands payment
2
Monitors and gathers user information secretly
3
Spreads through a network without attaching to files
4
Displays pop-up ads when offline

63

media

64

Multiple Choice

What is the primary purpose of adware?
1
Encrypt files and demand ransom
2
Display adverts or pop-ups, even offline
3
Spread through networks and slow them down
4
Give attackers remote access

65

media

66

media

67

media

68

media

69

media

70

media

71

Multiple Choice

Which of these is a legitimate use of bots?
1
Buying limited-edition products to resell at higher prices
2
Performing Distributed Denial of Service (DDoS) attacks
3
Finding new websites for search engines to index
4
Scanning for vulnerabilities to exploit

72

media

73

media

74

media

75

media

76

Multiple Choice

What is a botnet typically used for?
1
Encrypting files on a single computer
2
Sending multiple requests to a server to cause a DDoS attack
3
Displaying pop-up advertisements
4
Monitoring prices for online shopping

77

media

78

media

79

media
media

Show answer

Auto Play

Slide 1 / 79

SLIDE