MIT-FIN

MIT-FIN

5th Grade

70 Qs

quiz-placeholder

Similar activities

ANIMAKER

ANIMAKER

5th Grade

71 Qs

Automotive Terminology Quiz

Automotive Terminology Quiz

5th Grade

68 Qs

MIT-FIN

MIT-FIN

Assessment

Quiz

Instructional Technology

5th Grade

Practice Problem

Medium

Created by

Seth Sarmiento

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

70 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

1. It is commonly known as the unauthorized access from a Third party user or application.

Hacking

Cyber Attack

Illegal access

Exploiting

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

2. It involves a techniques that help in securing various components of networks, data and computer system.

Cyber Attack

Cyber Crime

Cyber Security

Hacking

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

3. It is the person who carries out a Cyber attack.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

4. This type of attack have to download any suspicious attachments online installed on the system that could have gotten corrupted by certain malicious viruses.

Malware Attack

Phishing Attack

Man-in-the-middle Attack

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

5. It is a type of cyber attack which an experienced hacker usually sends fraudulent emails which appear to be coming from a legitimate source, this is done to install malware or to steal sensitive data like credit card information and login credentials.

Malware Attack

Phishing attack

Man-in-the-middle Attack

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

6. It is a type of attack where the hacker gains access to the information path between any device and the websites

server. The hackers computer takes over an IP address, by doing so the communication line between the device and the

website is secretly intercepted. This commonly happens with unsecured Wi-Fi networks.

Malware Attacks

Man-in-the-middle Attack

Phishing Attack

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

7. It serves as a filter the incoming and outgoing traffic from your device to safeguard your network and they can either be software applications or Hardware reinforcements.

SMTP

Security protocols

Filtered data

Internet firewalls

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology