Network Security Revision

Network Security Revision

11th Grade

10 Qs

quiz-placeholder

Similar activities

SQL

SQL

11th - 12th Grade

15 Qs

WEB DESIGN

WEB DESIGN

11th Grade - University

10 Qs

Podsumowanie: binarny, komputer, sieć

Podsumowanie: binarny, komputer, sieć

7th Grade - University

13 Qs

8525 AQA GCSE CS 3.7.1 Introduction to Relational Data

8525 AQA GCSE CS 3.7.1 Introduction to Relational Data

11th Grade

10 Qs

UH 1 Basis Data XI

UH 1 Basis Data XI

11th Grade

10 Qs

CZERWIEC 2016

CZERWIEC 2016

1st - 12th Grade

13 Qs

Identity Theft

Identity Theft

9th - 12th Grade

10 Qs

Sonic-Pi: Duration with Envelopes

Sonic-Pi: Duration with Envelopes

9th Grade - University

14 Qs

Network Security Revision

Network Security Revision

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Pritpal Mann

Used 17+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Some attacks don't always cause damage or change data. Why might an attacker simply steal personal or sensitive data? Select all that apply

Blackmail and extortion

Backups and archiving

SQL injection

Fraud

Industrial espionage

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do we call sending fake emails to fool people into revealing personal information?

Phishing

Blagging

Shouldering

Pharming

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Computer systems attached to the internet are more vulnerable to attack than systems which are offline. True or false?

True

False

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Phishing emails are often easy to spot. What should you look for? Select all that apply

Poor grammar and spelling

Images and logos are poor quality copies

They are always in the "Spam" or "Junk" folder

"Dear Customer" and no mention of your name

Hyperlinks show a different URL when you hover on them

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Manipulating someone into giving out private or confidential information, e.g. through phishing or pretexting, is what type of attack?

Extrinsic motivation

Social engineering

Human persuasion

Physical coercion

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If a web form input is not validated, what attack is more likely?

Malware

Denial of Service

SQL Injection

Social Engineering

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This attack stops legitimate users from accessing a system, by overloading it with traffic

Website closure

Server soaking

Traffic swamping

Denial of service

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?