Cyber Security

Cyber Security

1st - 4th Grade

20 Qs

quiz-placeholder

Similar activities

Ôn tập Tin 9

Ôn tập Tin 9

1st Grade

16 Qs

Computer

Computer

4th - 7th Grade

20 Qs

BIM1014 Quiz 2

BIM1014 Quiz 2

KG - University

15 Qs

Làm quen với phần mềm trình chiếu

Làm quen với phần mềm trình chiếu

3rd Grade

20 Qs

B Words GCSE Computer Science

B Words GCSE Computer Science

1st - 10th Grade

15 Qs

Ôn tập Tin Học Lớp 3-24-25

Ôn tập Tin Học Lớp 3-24-25

4th Grade

22 Qs

Latihan US TKJ-Sesion 1

Latihan US TKJ-Sesion 1

1st Grade

20 Qs

Test

Test

KG - University

25 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

1st - 4th Grade

Practice Problem

Medium

Created by

Mr. Browne

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is meant by the term 'hacking'?

When a person finds out weaknesses in an established system and exploiting them.

The set of measures taken to protect a computer from harm to its data and software.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hacker is given permission to hack into system and identify any loopholes or vulnerabilities. They are motivated to keep computer systems safe from malicious backing attempts

White hat hackers

Grey hat hackers

Black hat hackers

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hacker hacks into computer system for fun or to troll. If they find a weaknesses they may offer to fix it but charge the business.

White hat hacker

Grey hat hacker

Black hat hacker

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hacker hacks into a computer system with malicious intent. They could be for theft, exploiting data or selling data on. This is illegal and you can be prosecuted under UK legislation.

White hat hacker

Grey hat hacker

Black hat hacker

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Define the term 'cyber security'

The set of measures taken to protect a computer from harm to its data and software. It also includes the protection of computer networks from unauthorised access.

An attempt to gain unauthorised access to, or control of, a computer and the network to which it is connected.

Finding out weaknesses in an established system and exploiting them. They may be motivated by profit, protest or challenge.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Define the term 'cyber attack'

An attempt to gain unauthorised access to, or control of, a computer and the network to which it is connected.

The set of measures taken to protect a computer from harm to its data and software. It also includes the protection of computer networks from unauthorised access.

Finding out weaknesses in an established system and exploiting them

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Define the term 'pen-testing'

An authorised, simulated attack on a computer system, network or website in order to identify any potential vulnerabilities

The professional 'hacker' is provided with all of the technical details for the system before they begin the test.

The professional is not given any technical details about the network

Hacker hacks into computer system for fun or to troll. If they find a weaknesses they may offer to fix it but charge the business.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?