Hacking - Lesson 2

Hacking - Lesson 2

9th Grade

10 Qs

quiz-placeholder

Similar activities

Cyber Security Homework 1

Cyber Security Homework 1

7th - 9th Grade

15 Qs

ICT Java programming workshop

ICT Java programming workshop

9th Grade

10 Qs

Coding helps to Understand

Coding helps to Understand

6th - 10th Grade

10 Qs

Arrays, 2D Arrays, and ArrayLists

Arrays, 2D Arrays, and ArrayLists

9th - 12th Grade

15 Qs

Networks

Networks

7th - 9th Grade

13 Qs

Programming Quiz

Programming Quiz

8th - 10th Grade

15 Qs

Q3 L4 (CSS 9)

Q3 L4 (CSS 9)

9th Grade

10 Qs

J808 LO1 and LO2 planning project keywords / terms

J808 LO1 and LO2 planning project keywords / terms

9th - 11th Grade

15 Qs

Hacking - Lesson 2

Hacking - Lesson 2

Assessment

Quiz

Computers

9th Grade

Practice Problem

Hard

Created by

Greg Sloan

Used 300+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When we try and take something we rely on people and the object having ....

Interdisciplinary

Interstate

Internal Reaction

Interactions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Interactions are split into two groups

Trust and Allows

Trust and Accesses

Tokens and Accesses

Tokens and Allows

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of a trust interaction is

When the interactions happen between people who are do not know each other

When the you get somebody else to do the work for you

When the interactions happen between people who are familiar with each other

When the interactions happen between people who are from the same family

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of an access interaction is

When the interactions happen between people or systems who do not know each other

When the you get somebody else to do the work for you

When the interactions happen between people who are familiar with each other

When the interaction is from a different country

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The correct definition of 'Attack Surface' is..

how big a computer network is

How likely it is to be attacked

The amount of different ways it is safe from hackers

All of the ways in which an unauthorised person can enter or steal data from an environment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a low 'visibility' is good for a company because?

It means hackers don't know what information you have

It means you don't make any money

It means hackers will not be able to hack you

It is free

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In terms of cyber security if your company has 'high porosity' it means ...

Your company is not worth much

You can resist hackers well

You have many holes in your cyber defences

You have low visibility

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?