Computer Science

Computer Science

6th Grade

11 Qs

quiz-placeholder

Similar activities

KS3 Sensors

KS3 Sensors

6th Grade

15 Qs

Five Nights At Freddy's: Security Breach Quiz

Five Nights At Freddy's: Security Breach Quiz

KG - Professional Development

13 Qs

Informatyka.Cyberbezpieczeństwo,e-zasoby i współpraca zdalna

Informatyka.Cyberbezpieczeństwo,e-zasoby i współpraca zdalna

1st - 6th Grade

13 Qs

Creating Webpages

Creating Webpages

6th - 8th Grade

12 Qs

Formatting a Spreadsheet

Formatting a Spreadsheet

6th Grade

10 Qs

ICT Matters

ICT Matters

4th Grade - Professional Development

10 Qs

Computers- Then and Now Grade 5

Computers- Then and Now Grade 5

2nd - 6th Grade

10 Qs

ICT - GRADE 6 - 3RD WEEK AUGUST 2021

ICT - GRADE 6 - 3RD WEEK AUGUST 2021

6th Grade

10 Qs

Computer Science

Computer Science

Assessment

Quiz

Computers, Instructional Technology

6th Grade

Hard

Created by

Francisco Javier Ruiz Restrepo

Used 173+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One characteristic that explains the term cyber-attack would be:

Cybercriminals using one or more computers against other computer producing some damages.

A single plan to produce damage

Damage produced to a computer in a netwrok

Act of steal private data

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Some consequences that cyber-attacks can produce ( 3 options are correct)

Loss of privacy

Establish new social contacts

Security breach technology

New alternatives to share different information

Shows how vulnerable are my data online

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Human mistakes in the accessing of online services occur because (3 options are correct)

Clicking on unsafe links

Sharing confidential information

Opening unknown attachments

Accepting strangers as contacts

Lossing of personal identity

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One of the following is not a cyber-attack

MitM

ADToS

Phishing

DDoS

Malware

5.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

The cyber-attack in which attacker intercepts communication between two hosts..

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Trojan horses, spyware and viruses are examples of.....attack

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One characterstic that explains DDoS attack

Its purpose is disrupt normal traffic on a network

the attacker's goal is to take control of a network

When attacker takes control of network is called botnet

All above correct

None above correct

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers