Network Security Revision

Network Security Revision

11th Grade

10 Qs

quiz-placeholder

Similar activities

SLR 4 - Cyber Security Threats - part 1

SLR 4 - Cyber Security Threats - part 1

9th - 11th Grade

10 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

cyber security qehs thing

cyber security qehs thing

9th Grade - University

10 Qs

Social Engineering [OCR Computer Science]

Social Engineering [OCR Computer Science]

9th - 11th Grade

5 Qs

1.5.4 - Starter Task/Cyber Resilience

1.5.4 - Starter Task/Cyber Resilience

11th Grade

12 Qs

J277.1.4.1.

J277.1.4.1.

11th Grade

11 Qs

L2 - Social Engineering  KS3

L2 - Social Engineering KS3

9th - 11th Grade

10 Qs

Network Security Revision

Network Security Revision

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Pritpal Mann

Used 17+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Some attacks don't always cause damage or change data. Why might an attacker simply steal personal or sensitive data? Select all that apply

Blackmail and extortion

Backups and archiving

SQL injection

Fraud

Industrial espionage

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do we call sending fake emails to fool people into revealing personal information?

Phishing

Blagging

Shouldering

Pharming

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Computer systems attached to the internet are more vulnerable to attack than systems which are offline. True or false?

True

False

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Phishing emails are often easy to spot. What should you look for? Select all that apply

Poor grammar and spelling

Images and logos are poor quality copies

They are always in the "Spam" or "Junk" folder

"Dear Customer" and no mention of your name

Hyperlinks show a different URL when you hover on them

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Manipulating someone into giving out private or confidential information, e.g. through phishing or pretexting, is what type of attack?

Extrinsic motivation

Social engineering

Human persuasion

Physical coercion

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If a web form input is not validated, what attack is more likely?

Malware

Denial of Service

SQL Injection

Social Engineering

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This attack stops legitimate users from accessing a system, by overloading it with traffic

Website closure

Server soaking

Traffic swamping

Denial of service

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?