Computer Science

Computer Science

6th Grade

11 Qs

quiz-placeholder

Similar activities

Cybersecurity, Victor Magnusson

Cybersecurity, Victor Magnusson

1st Grade - Professional Development

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Cybersecurity: Part One

Cybersecurity: Part One

6th - 8th Grade

13 Qs

TRP Forms of Attack

TRP Forms of Attack

3rd - 7th Grade

10 Qs

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

Be Internet Awesome: Don't Fall for Fake!

Be Internet Awesome: Don't Fall for Fake!

5th - 8th Grade

9 Qs

Year6 Revision Test-2

Year6 Revision Test-2

6th Grade

10 Qs

Cybersecurity Attacks and Prevention

Cybersecurity Attacks and Prevention

6th - 8th Grade

15 Qs

Computer Science

Computer Science

Assessment

Quiz

Computers, Instructional Technology

6th Grade

Hard

Created by

Francisco Javier Ruiz Restrepo

Used 171+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One characteristic that explains the term cyber-attack would be:

Cybercriminals using one or more computers against other computer producing some damages.

A single plan to produce damage

Damage produced to a computer in a netwrok

Act of steal private data

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Some consequences that cyber-attacks can produce ( 3 options are correct)

Loss of privacy

Establish new social contacts

Security breach technology

New alternatives to share different information

Shows how vulnerable are my data online

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Human mistakes in the accessing of online services occur because (3 options are correct)

Clicking on unsafe links

Sharing confidential information

Opening unknown attachments

Accepting strangers as contacts

Lossing of personal identity

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One of the following is not a cyber-attack

MitM

ADToS

Phishing

DDoS

Malware

5.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

The cyber-attack in which attacker intercepts communication between two hosts..

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Trojan horses, spyware and viruses are examples of.....attack

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One characterstic that explains DDoS attack

Its purpose is disrupt normal traffic on a network

the attacker's goal is to take control of a network

When attacker takes control of network is called botnet

All above correct

None above correct

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?