
Brute Force and DoS
Authored by Stephanie Jones
Computers
5th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these rules is NOT a good guideline for managing passwords?
Do not use a previous password
Do not use a password with identifiable items (such as phone number)
Make the password as long as possible
Ensure that it includes a mix of character types
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What method of attack is shown in the image?
DOS
Brute Force
SQL Injection
DNS Pharming
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does malware get onto your computer?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of a brute force attack?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is NOT a good password?
#LooneyToons23
Ilovecats!95
password
#Iasw,aA!
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if you think you have been hacked?
Report the problem to the company.
Change your password.
Tell your parents or a trusted adult.
All of the above.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these indicates a website is secure?
You found the website on Google or clicked it from a link in an email.
A little lock icon next to the website address.
The website shows a company name and logo and looks real.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?