Hacking - Lesson 2

Hacking - Lesson 2

9th Grade

10 Qs

quiz-placeholder

Similar activities

2.GRADE STORY 5

2.GRADE STORY 5

2nd Grade - University

15 Qs

MS-Excel - STRING  Functions

MS-Excel - STRING Functions

7th - 12th Grade

15 Qs

Y10M2A2 - Selection

Y10M2A2 - Selection

6th - 10th Grade

15 Qs

CSP Unit 13 Practice Test

CSP Unit 13 Practice Test

9th - 12th Grade

15 Qs

Fashion Merchandising 1.01

Fashion Merchandising 1.01

9th - 12th Grade

10 Qs

Wie gut kenne ich mein Smartphone?

Wie gut kenne ich mein Smartphone?

1st - 10th Grade

10 Qs

G9 QUIZ 1 2ND QUARTER

G9 QUIZ 1 2ND QUARTER

9th Grade

15 Qs

Hacking - Lesson 2

Hacking - Lesson 2

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Greg Sloan

Used 299+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When we try and take something we rely on people and the object having ....

Interdisciplinary

Interstate

Internal Reaction

Interactions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Interactions are split into two groups

Trust and Allows

Trust and Accesses

Tokens and Accesses

Tokens and Allows

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of a trust interaction is

When the interactions happen between people who are do not know each other

When the you get somebody else to do the work for you

When the interactions happen between people who are familiar with each other

When the interactions happen between people who are from the same family

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of an access interaction is

When the interactions happen between people or systems who do not know each other

When the you get somebody else to do the work for you

When the interactions happen between people who are familiar with each other

When the interaction is from a different country

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The correct definition of 'Attack Surface' is..

how big a computer network is

How likely it is to be attacked

The amount of different ways it is safe from hackers

All of the ways in which an unauthorised person can enter or steal data from an environment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a low 'visibility' is good for a company because?

It means hackers don't know what information you have

It means you don't make any money

It means hackers will not be able to hack you

It is free

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In terms of cyber security if your company has 'high porosity' it means ...

Your company is not worth much

You can resist hackers well

You have many holes in your cyber defences

You have low visibility

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?