Computer Security

Computer Security

10th Grade

7 Qs

quiz-placeholder

Similar activities

KRIPTOGRAFI T3 BHGN 1

KRIPTOGRAFI T3 BHGN 1

10th Grade

11 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

REVIEW AD KLS 9

REVIEW AD KLS 9

9th Grade - University

10 Qs

OCR GCSE CS - 2.1 ERL sorts and searches

OCR GCSE CS - 2.1 ERL sorts and searches

10th - 11th Grade

9 Qs

Generasi Komputer

Generasi Komputer

10th Grade

10 Qs

DigiTech Unit 1 Data 1

DigiTech Unit 1 Data 1

7th - 12th Grade

10 Qs

Berpikir Komputasional

Berpikir Komputasional

10th Grade

10 Qs

CAT G10 M19 AMA Session 1 Quiz

CAT G10 M19 AMA Session 1 Quiz

10th Grade

10 Qs

Computer Security

Computer Security

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

Created by

Jon Rogers

Used 35+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The number 1 danger to networks in the UK in 2024 is...

The Russians

The Chinese

Human error

Viruses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

An exploit where the vendor is unaware of the flaw and so has not made a patch available.

Zero day attack

Data interception

SQL Injection

Brute force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Trying every possible combination e.g. letters & numbers in a password

Zero day attack

Data interception

SQL Injection

Brute force

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Also called wiretapping - when packets on a network are captured with a compromised router or other specialised hardware

Zero day attack

Data interception

SQL Injection

Brute force

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

A network or device is overwhelmed by a massive amount of data traffic being directed at it

Zero day attack

Data interception

SQL Injection

Denial of Service

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Data entry forms are filled in with code that allows a hacker to access data from the database directly

Zero day attack

Data interception

SQL Injection

Denial of Service

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which of the following tell-tale signs of a phishing email can be seen in this image (click to zoom!)

Poor spelling or grammar

Inauthentic email address

Excessive urgency

Links to click

Impersonal greeting

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?