1.2.1 Cybersecurity Firewalls and Malware

1.2.1 Cybersecurity Firewalls and Malware

9th - 12th Grade

23 Qs

quiz-placeholder

Similar activities

Networking

Networking

11th - 12th Grade

20 Qs

Network Topologies

Network Topologies

1st - 12th Grade

20 Qs

Identifying Security Threats

Identifying Security Threats

9th - 12th Grade

21 Qs

[AP CSP] Malware & Phishing Scams

[AP CSP] Malware & Phishing Scams

9th - 12th Grade

21 Qs

MALWARE

MALWARE

9th Grade

20 Qs

WJEC GCSE Computer Science - Security

WJEC GCSE Computer Science - Security

9th - 10th Grade

18 Qs

Networks - OCR Computer Science

Networks - OCR Computer Science

10th Grade

19 Qs

(L2) 1.4 Network Security

(L2) 1.4 Network Security

10th Grade

19 Qs

1.2.1 Cybersecurity Firewalls and Malware

1.2.1 Cybersecurity Firewalls and Malware

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Robin Robertson

Used 29+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The arrangement of the various elements (computers, routers, switches, etc) of a network.

services

LAN

WAN

network topology

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small local area network of computers and devices.

LAN

WAN

network topology

short message service (SMS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Service can have two meanings in computer terminology:

a) A service can be a specific application or function such as email, chat, etc.

b) A service can refer to a specific part of an application, such as transmitting the data of a web page

network topology

LAN

services

short message service (SMS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cybersecurity terms, a vulnerability is a weakness in a system that allows an attacker to gain unauthorized access.

WAN

vulnerabilities

worm

backdoor

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that is spread by people, specifically user actions, usually through emails, websites, and chats. A virus infects your computer, causing a wide variety of problems.

backdoor

services

worm

virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Similar to a virus except that a worm does not need a human to spread, rather it can replicate on its own to infect other computers.

virus

worm

backdoor

spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that bypasses the normal, secure, or restricted access.

worm

backdoor

trojan horse

spyware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?