Cyber Security

Cyber Security

1st - 4th Grade

20 Qs

quiz-placeholder

Similar activities

TYPES OF COMPUTERS

TYPES OF COMPUTERS

4th - 7th Grade

20 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

Computer Hardware

Computer Hardware

KG - 5th Grade

20 Qs

INPUT AND OUTPUT DEVICES

INPUT AND OUTPUT DEVICES

4th Grade

20 Qs

Network safety

Network safety

KG - 6th Grade

20 Qs

Computer 5

Computer 5

4th - 6th Grade

20 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Topic 1 - Computer Fundamentals

Topic 1 - Computer Fundamentals

1st - 9th Grade

16 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

1st - 4th Grade

Medium

Created by

Mr. Browne

Used 6+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is meant by the term 'hacking'?

When a person finds out weaknesses in an established system and exploiting them.

The set of measures taken to protect a computer from harm to its data and software.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hacker is given permission to hack into system and identify any loopholes or vulnerabilities. They are motivated to keep computer systems safe from malicious backing attempts

White hat hackers

Grey hat hackers

Black hat hackers

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hacker hacks into computer system for fun or to troll. If they find a weaknesses they may offer to fix it but charge the business.

White hat hacker

Grey hat hacker

Black hat hacker

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hacker hacks into a computer system with malicious intent. They could be for theft, exploiting data or selling data on. This is illegal and you can be prosecuted under UK legislation.

White hat hacker

Grey hat hacker

Black hat hacker

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Define the term 'cyber security'

The set of measures taken to protect a computer from harm to its data and software. It also includes the protection of computer networks from unauthorised access.

An attempt to gain unauthorised access to, or control of, a computer and the network to which it is connected.

Finding out weaknesses in an established system and exploiting them. They may be motivated by profit, protest or challenge.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Define the term 'cyber attack'

An attempt to gain unauthorised access to, or control of, a computer and the network to which it is connected.

The set of measures taken to protect a computer from harm to its data and software. It also includes the protection of computer networks from unauthorised access.

Finding out weaknesses in an established system and exploiting them

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Define the term 'pen-testing'

An authorised, simulated attack on a computer system, network or website in order to identify any potential vulnerabilities

The professional 'hacker' is provided with all of the technical details for the system before they begin the test.

The professional is not given any technical details about the network

Hacker hacks into computer system for fun or to troll. If they find a weaknesses they may offer to fix it but charge the business.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?