Y8 System security

Y8 System security

5th Grade

10 Qs

quiz-placeholder

Similar activities

Correo electrónico Grupo 1

Correo electrónico Grupo 1

5th Grade

10 Qs

Be4PSPM 1

Be4PSPM 1

1st - 5th Grade

10 Qs

Power Point

Power Point

1st - 5th Grade

14 Qs

WAN Sesi 1

WAN Sesi 1

1st Grade - University

10 Qs

Fun with text tool

Fun with text tool

3rd - 5th Grade

12 Qs

EXAMEN-2°AÑO-INFORMATICA P3-2021

EXAMEN-2°AÑO-INFORMATICA P3-2021

1st - 9th Grade

13 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

RESPONSIBLE USE OF ICT

RESPONSIBLE USE OF ICT

4th - 6th Grade

10 Qs

Y8 System security

Y8 System security

Assessment

Quiz

Computers

5th Grade

Practice Problem

Medium

Created by

Mr Bell

Used 17+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A program that installs and runs on a computer without the user’s knowledge.

Hardware that controls a user’s computer without their knowledge.

A faulty piece of software.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a virus?

A program that makes the user feel unwell.

A program that replicates itself and spreads to other computers via attachments.

A program that you can download for free.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spyware?

A program that replicates itself and spreads to other computers via attachments.

Hardware that controls a computer without the user's knowledge.

A program that monitors computer activity in an attempt to steal sensitive information.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be used to remove malware from a computer?

Anti-malware software

A firewall

A filter

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes a passive attack?

Someone attacks a network with malware.

Someone from inside an organisation uses the network to steal information.

Someone monitors data travelling on the network to steal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes an active attack?

Someone attacks a network with malware.

Someone from inside an organisation uses the network to steal information.

Someone monitors data travelling on the network to steal information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes a brute force attack?

A hacker tries to stop people from accessing a network by flooding it with traffic.

Someone tries to get information by cracking password through trial and error.

Someone from inside an organisation tries to steal information.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?