Computer Science

Computer Science

6th Grade

11 Qs

quiz-placeholder

Similar activities

School Event- Networking and Cyber Security Quiz

School Event- Networking and Cyber Security Quiz

6th - 8th Grade

12 Qs

Year 9 - Cybersecurity

Year 9 - Cybersecurity

6th - 8th Grade

15 Qs

"Don't fall for the Fake" - Lesson 2

"Don't fall for the Fake" - Lesson 2

6th Grade

13 Qs

Cyber Security Quiz

Cyber Security Quiz

6th - 8th Grade

15 Qs

Testing

Testing

6th Grade

11 Qs

Fraud

Fraud

KG - Professional Development

13 Qs

You and Your Data

You and Your Data

6th - 8th Grade

11 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Computer Science

Computer Science

Assessment

Quiz

Computers, Instructional Technology

6th Grade

Hard

Created by

Francisco Javier Ruiz Restrepo

Used 172+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One characteristic that explains the term cyber-attack would be:

Cybercriminals using one or more computers against other computer producing some damages.

A single plan to produce damage

Damage produced to a computer in a netwrok

Act of steal private data

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Some consequences that cyber-attacks can produce ( 3 options are correct)

Loss of privacy

Establish new social contacts

Security breach technology

New alternatives to share different information

Shows how vulnerable are my data online

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Human mistakes in the accessing of online services occur because (3 options are correct)

Clicking on unsafe links

Sharing confidential information

Opening unknown attachments

Accepting strangers as contacts

Lossing of personal identity

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One of the following is not a cyber-attack

MitM

ADToS

Phishing

DDoS

Malware

5.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

The cyber-attack in which attacker intercepts communication between two hosts..

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Trojan horses, spyware and viruses are examples of.....attack

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One characterstic that explains DDoS attack

Its purpose is disrupt normal traffic on a network

the attacker's goal is to take control of a network

When attacker takes control of network is called botnet

All above correct

None above correct

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?