MIT-FIN

MIT-FIN

5th Grade

70 Qs

quiz-placeholder

Similar activities

Cuestionario sobre Tecnología y Seguridad Digital

Cuestionario sobre Tecnología y Seguridad Digital

3rd Grade - University

70 Qs

3-5 STEM Assessment

3-5 STEM Assessment

3rd - 5th Grade

74 Qs

Prog_y_Rob_Sem2

Prog_y_Rob_Sem2

1st - 12th Grade

70 Qs

Exam

Exam

5th Grade

68 Qs

For missvera

For missvera

5th Grade

72 Qs

Thumbnails, Content Curation & UGC

Thumbnails, Content Curation & UGC

5th Grade

66 Qs

leyes relacionadas con la tecnologia

leyes relacionadas con la tecnologia

1st - 5th Grade

67 Qs

FACTORES QUE INFLUYEN EN LA EVOLUCION DE LA TECNOLOGIA

FACTORES QUE INFLUYEN EN LA EVOLUCION DE LA TECNOLOGIA

1st - 5th Grade

70 Qs

MIT-FIN

MIT-FIN

Assessment

Quiz

Instructional Technology

5th Grade

Medium

Created by

Seth Sarmiento

Used 9+ times

FREE Resource

70 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

1. It is commonly known as the unauthorized access from a Third party user or application.

Hacking

Cyber Attack

Illegal access

Exploiting

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

2. It involves a techniques that help in securing various components of networks, data and computer system.

Cyber Attack

Cyber Crime

Cyber Security

Hacking

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

3. It is the person who carries out a Cyber attack.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

4. This type of attack have to download any suspicious attachments online installed on the system that could have gotten corrupted by certain malicious viruses.

Malware Attack

Phishing Attack

Man-in-the-middle Attack

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

5. It is a type of cyber attack which an experienced hacker usually sends fraudulent emails which appear to be coming from a legitimate source, this is done to install malware or to steal sensitive data like credit card information and login credentials.

Malware Attack

Phishing attack

Man-in-the-middle Attack

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

6. It is a type of attack where the hacker gains access to the information path between any device and the websites

server. The hackers computer takes over an IP address, by doing so the communication line between the device and the

website is secretly intercepted. This commonly happens with unsecured Wi-Fi networks.

Malware Attacks

Man-in-the-middle Attack

Phishing Attack

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

7. It serves as a filter the incoming and outgoing traffic from your device to safeguard your network and they can either be software applications or Hardware reinforcements.

SMTP

Security protocols

Filtered data

Internet firewalls

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?