Computer Security

Computer Security

10th Grade

7 Qs

quiz-placeholder

Similar activities

Network Threat Specs

Network Threat Specs

9th - 10th Grade

7 Qs

BTEC cyber security

BTEC cyber security

9th - 12th Grade

10 Qs

System Threats and Vulnerablitiles

System Threats and Vulnerablitiles

10th Grade

10 Qs

2.3.1 Cyber Securing Ecommerce Data

2.3.1 Cyber Securing Ecommerce Data

9th - 12th Grade

12 Qs

Unit 3 - 2.4.12 Application Attacks Part 2

Unit 3 - 2.4.12 Application Attacks Part 2

9th Grade - University

7 Qs

Internet Security

Internet Security

9th - 11th Grade

10 Qs

Network Security [OCR GCSE]

Network Security [OCR GCSE]

10th Grade

10 Qs

Threat prevention

Threat prevention

10th Grade

8 Qs

Computer Security

Computer Security

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Jon Rogers

Used 35+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The number 1 danger to networks in the UK in 2024 is...

The Russians

The Chinese

Human error

Viruses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

An exploit where the vendor is unaware of the flaw and so has not made a patch available.

Zero day attack

Data interception

SQL Injection

Brute force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Trying every possible combination e.g. letters & numbers in a password

Zero day attack

Data interception

SQL Injection

Brute force

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Also called wiretapping - when packets on a network are captured with a compromised router or other specialised hardware

Zero day attack

Data interception

SQL Injection

Brute force

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

A network or device is overwhelmed by a massive amount of data traffic being directed at it

Zero day attack

Data interception

SQL Injection

Denial of Service

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Data entry forms are filled in with code that allows a hacker to access data from the database directly

Zero day attack

Data interception

SQL Injection

Denial of Service

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which of the following tell-tale signs of a phishing email can be seen in this image (click to zoom!)

Poor spelling or grammar

Inauthentic email address

Excessive urgency

Links to click

Impersonal greeting