Network Security Revision

Network Security Revision

11th Grade

10 Qs

quiz-placeholder

Similar activities

Uji Pengetahuan Keamanan Jaringan

Uji Pengetahuan Keamanan Jaringan

11th Grade

15 Qs

2.3.1 Cyber Securing Ecommerce Data

2.3.1 Cyber Securing Ecommerce Data

9th - 12th Grade

12 Qs

Cybersecurity Quiz: 5.17 Labs

Cybersecurity Quiz: 5.17 Labs

11th Grade

10 Qs

Keamanan Jaringan

Keamanan Jaringan

11th Grade

10 Qs

Mobile Security

Mobile Security

9th - 12th Grade

14 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Network Security Revision

Network Security Revision

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Pritpal Mann

Used 17+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Some attacks don't always cause damage or change data. Why might an attacker simply steal personal or sensitive data? Select all that apply

Blackmail and extortion

Backups and archiving

SQL injection

Fraud

Industrial espionage

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do we call sending fake emails to fool people into revealing personal information?

Phishing

Blagging

Shouldering

Pharming

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Computer systems attached to the internet are more vulnerable to attack than systems which are offline. True or false?

True

False

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Phishing emails are often easy to spot. What should you look for? Select all that apply

Poor grammar and spelling

Images and logos are poor quality copies

They are always in the "Spam" or "Junk" folder

"Dear Customer" and no mention of your name

Hyperlinks show a different URL when you hover on them

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Manipulating someone into giving out private or confidential information, e.g. through phishing or pretexting, is what type of attack?

Extrinsic motivation

Social engineering

Human persuasion

Physical coercion

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If a web form input is not validated, what attack is more likely?

Malware

Denial of Service

SQL Injection

Social Engineering

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This attack stops legitimate users from accessing a system, by overloading it with traffic

Website closure

Server soaking

Traffic swamping

Denial of service

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?