1.6 Threats to networks 1: People as the weak point

1.6 Threats to networks 1: People as the weak point

10th Grade

12 Qs

quiz-placeholder

Similar activities

TLE-CCS 10 Q2 Lessons 6,8-9 GRAMMAR

TLE-CCS 10 Q2 Lessons 6,8-9 GRAMMAR

10th Grade

15 Qs

Disk Management and Boot Sequence Vocab

Disk Management and Boot Sequence Vocab

9th - 12th Grade

15 Qs

Bài 8: Mạng máy tính trong cuộc sống hiện đại

Bài 8: Mạng máy tính trong cuộc sống hiện đại

10th Grade

10 Qs

KKPI

KKPI

10th - 12th Grade

10 Qs

Network Classifications

Network Classifications

KG - 10th Grade

10 Qs

Information Technology

Information Technology

9th - 11th Grade

15 Qs

ICT Service Solutions 2

ICT Service Solutions 2

8th - 12th Grade

17 Qs

Windows 7 Installation

Windows 7 Installation

10th - 12th Grade

10 Qs

1.6 Threats to networks 1: People as the weak point

1.6 Threats to networks 1: People as the weak point

Assessment

Quiz

Computers

10th Grade

Medium

Created by

N Dickinson

Used 47+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tricking people into divulging secret information such as passwords and login information

Social Engineering

Poor Network Policy

Poor Password Policy

Denial of Service

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fake emails or fake online messages from a bank or an online shop asking for details of passwords and credit cards.


Usually contains a malicious link for you to click on.

Phishing

Blagging

Shouldering

Pharming

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

This is an example of ...

Phishing

Blagging

Shouldering

Pharming

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Involves a criminal inventing a scenario to persuade a victim to give out information.


For example, pretending to be another employee or network admin

Phishing

Blagging

Shouldering

Pharming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Involves finding passwords and PINs by watching people as they enter them. Could happen in a busy office or at a distance using binoculars

Phishing

Blagging

Shouldering

Pharming

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

People who use a computer network (employees / students / teachers) must read and sign this document.

Acceptable use policy

Unacceptable use policy

Health and safety document

Electrical use document

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is not likely to be in a network acceptable use policy

Users must not use their own usb devices on the network as they may spread viruses

Users must not download files from the internet as they may be infected

Users must always log off when they are not using a computer

Users must leave their passwords visible on their desk

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?