
Cyber Security Attacks
Authored by M Duce
Computers
9th - 12th Grade
Used 230+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
............... is a main, reliable method of keeping your data secure – this scrambles data so anyone intercepting it cannot interpret it
Verification
Authentication
Phishing
Encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Unauthorized access to control over computer network security systems
Security
Hacking
Surfing
Dancing
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following is NOT a security threat?
Worms
Hacking
Anti-Virus
Pharming
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What's the name given to the cyber-attack where the perpetrator seeks to make a website unavailable to its intended users by overloading it with requests?
Denial of Service
Pharming
Trojan Horse
Flooder
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which one of the following is NOT a type of CyberSecurity Attack?
Worms
Randsomware
Spyware
Password
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Viruses, worms, and trojans are common know as?
Malware
Formalware
Scams
The Spreading attackers
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Fake e-mail message appearing to be from a trusted business asking for personal information such as passwords?
Farming
Pharming
Phishing
Fishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?