Search Header Logo

Cybersecurity 1

Authored by David Jonathan Alford

Computers

5th Grade - University

Used 51+ times

Cybersecurity 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the term for sending a fake email that looks like it's from a real company, to fool people?

Fishing

Farming

Phishing

Pharming

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is pharming?

Having users directed to a fake website instead of a genuine website, to fool them

Using software to watch what users do on their computer

Sending a fake email that looks genuine, to fool users

Buying collections of user profiles from hackers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you be sure that a website is genuine

It will have a digital certificate

The text on the website will be spelled correctly

The website will have the real company logo on it

You found the website using a search engine

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a DNS (Domain Name Service) Server work?

The user computer sends the web address to the DNS Server, and the DNS Server directs the user computer to the correct IP address

The user computer sends its IP address to the DNS Server, and the DNS Server directs the user computer to the correct IP address

The user computer sends some keywords to the DNS Server, and the DNS Server provides a list of sites that contain those words

The server is overloaded with requests and cannot perform it's usual function

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a DOS (Denial of Service) attack affect a server?

The server is overloaded with requests and cannot perform it's usual function

The server cannot be found because it's address has been removed from the Domain Name Service

A hacker has removed the server from a search engine's database

A virus has infected the server and crashed the operating system

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best defence against hackers?

A firewall

A phishing filter

Up to date antivirus software

A trojan

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a virus that pretends to be a harmless file?

trojan

worm

tracking cookie

cipher text

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?