Y8 System security

Y8 System security

5th Grade

10 Qs

quiz-placeholder

Similar activities

Network Device

Network Device

5th Grade

10 Qs

What is Cybercrime?

What is Cybercrime?

5th Grade

10 Qs

Talking Safely Online

Talking Safely Online

3rd - 5th Grade

11 Qs

1. Networks

1. Networks

5th Grade

10 Qs

Y9 Wired and wireless networks

Y9 Wired and wireless networks

5th Grade

10 Qs

Information Privacy SP

Information Privacy SP

4th - 8th Grade

10 Qs

computer science

computer science

5th Grade

8 Qs

Types of Websites and Recognizing Click Bait

Types of Websites and Recognizing Click Bait

4th - 7th Grade

13 Qs

Y8 System security

Y8 System security

Assessment

Quiz

Computers

5th Grade

Medium

Created by

Mr Bell

Used 17+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A program that installs and runs on a computer without the user’s knowledge.

Hardware that controls a user’s computer without their knowledge.

A faulty piece of software.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a virus?

A program that makes the user feel unwell.

A program that replicates itself and spreads to other computers via attachments.

A program that you can download for free.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spyware?

A program that replicates itself and spreads to other computers via attachments.

Hardware that controls a computer without the user's knowledge.

A program that monitors computer activity in an attempt to steal sensitive information.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be used to remove malware from a computer?

Anti-malware software

A firewall

A filter

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes a passive attack?

Someone attacks a network with malware.

Someone from inside an organisation uses the network to steal information.

Someone monitors data travelling on the network to steal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes an active attack?

Someone attacks a network with malware.

Someone from inside an organisation uses the network to steal information.

Someone monitors data travelling on the network to steal information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes a brute force attack?

A hacker tries to stop people from accessing a network by flooding it with traffic.

Someone tries to get information by cracking password through trial and error.

Someone from inside an organisation tries to steal information.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?