Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

10th Grade

15 Qs

quiz-placeholder

Similar activities

social engineering

social engineering

1st Grade - Professional Development

10 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

Security Risk

Security Risk

10th Grade

15 Qs

IGCSE ICT Chapter 8 - Safety & Security

IGCSE ICT Chapter 8 - Safety & Security

9th - 10th Grade

20 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Identity Theft

Identity Theft

8th - 12th Grade

12 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

8th - 10th Grade

20 Qs

Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Paul Greenwood

Used 141+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the strongest password

password

Password

Password1

Pa33w0rd!

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What one is a type of verification?

Phishing

Trojan Horse

CAPTCHA

VERY

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

............... is a main, reliable method of keeping your data secure – this scrambles data so anyone intercepting it cannot interpret it

Verification

Authentication

Phishing

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unauthorized access to control over computer network security systems

Security

Hacking

Surfing

Dancing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a security threat?

Worms

Hacking

Anti-Virus

Pharming

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the name given to the cyber-attack where the perpetrator seeks to make a machine unavailable to its intended users by temporarily disrupting its services, typically accomplished by flooding the targeted machine in an attempt to overload it?

DDos

Pharming

Trojan Horse

Flooder

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a type of CyberSecurity Attack?

Worms

Randsomware

Spyware

Password Management

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?