Network Security Revision

Network Security Revision

11th Grade

10 Qs

quiz-placeholder

Similar activities

Databases - DBMS

Databases - DBMS

1st - 11th Grade

10 Qs

Keamanan JarKom

Keamanan JarKom

11th Grade

10 Qs

Five Nights At Freddy's: Security Breach Quiz

Five Nights At Freddy's: Security Breach Quiz

KG - Professional Development

13 Qs

Dampak TIK

Dampak TIK

10th - 12th Grade

10 Qs

Malware

Malware

7th Grade - University

11 Qs

Banco de Dados - Modelo Entidade Relacionamento (ER)

Banco de Dados - Modelo Entidade Relacionamento (ER)

11th Grade

10 Qs

SQL - strukturalny język zapytań

SQL - strukturalny język zapytań

9th Grade - University

15 Qs

BTEC DIT C3 LAB - Internal Threats

BTEC DIT C3 LAB - Internal Threats

10th - 11th Grade

10 Qs

Network Security Revision

Network Security Revision

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Pritpal Mann

Used 17+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Some attacks don't always cause damage or change data. Why might an attacker simply steal personal or sensitive data? Select all that apply

Blackmail and extortion

Backups and archiving

SQL injection

Fraud

Industrial espionage

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do we call sending fake emails to fool people into revealing personal information?

Phishing

Blagging

Shouldering

Pharming

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Computer systems attached to the internet are more vulnerable to attack than systems which are offline. True or false?

True

False

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Phishing emails are often easy to spot. What should you look for? Select all that apply

Poor grammar and spelling

Images and logos are poor quality copies

They are always in the "Spam" or "Junk" folder

"Dear Customer" and no mention of your name

Hyperlinks show a different URL when you hover on them

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Manipulating someone into giving out private or confidential information, e.g. through phishing or pretexting, is what type of attack?

Extrinsic motivation

Social engineering

Human persuasion

Physical coercion

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If a web form input is not validated, what attack is more likely?

Malware

Denial of Service

SQL Injection

Social Engineering

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This attack stops legitimate users from accessing a system, by overloading it with traffic

Website closure

Server soaking

Traffic swamping

Denial of service

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?