Search Header Logo

Stand alone - Cyber Security

Authored by E Gibson

Computers

9th Grade

Used 4+ times

Stand alone - Cyber Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Man in the Middle Attack is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Abusing trust to gain access to a computer system

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Passwords...

Must be simple

Must be the same between accounts

Vary between accounts

Must be complex

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a website is using HTTPS it means that...

Data sent and received is encrypted

Data sent and received can be viewed by others

Data received is encrypted

Data sent is encrypted

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following would be the strongest password?

password

Tigers78542.

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following would be the strongest password?

Soofmu1.

123456

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

How many characters should be in a password?

5

7

8+

6

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A trial and error method of attempting passwords. Automated software us used to generate a large number of consecutive guesses. Also known as...

Brute Force Attack

Social Engineering

Man in the Middle Attack

Hacking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?