Cyber Security

Cyber Security

9th - 11th Grade

13 Qs

quiz-placeholder

Similar activities

BTEC DIT C3 LAB - Security Policies & Disaster Recovery

BTEC DIT C3 LAB - Security Policies & Disaster Recovery

10th - 11th Grade

10 Qs

BTEC DIT - C3 - B3 - Policy

BTEC DIT - C3 - B3 - Policy

11th Grade

9 Qs

Digital Technology Careers Quiz

Digital Technology Careers Quiz

10th Grade - University

10 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

Ict/cyberterrorism

Ict/cyberterrorism

KG - Professional Development

9 Qs

Hacking

Hacking

10th Grade

13 Qs

Different categories of Hacking

Different categories of Hacking

10th - 12th Grade

12 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

9th - 11th Grade

Hard

Created by

Nicola Woods

Used 33+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DoS is...

Disruption of Service

Denial of Service

Disruption of Security

Data of Server

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber attack where the communication between two devices is intercepted and potentially tampered with is.....

Hacking

Man in the middle attack

Pharming

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is not an internal threat?

Using portable storage devices

Visiting Untrustworthy websites

Pharming

Accidental disclosure of data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is not a physical security measure?

Electronic swipe lock

Firewall

Cable lock

CCTV

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PIN + Biometric match is an example of

Strong passwords

Digital security

Two factor authenication

captcha test

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software design which makes and application easier to use and more secure is

Autocomplete

Obscuring data entry

Stay logged in

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program that allows an unauthorised user to obtain undetected control of a computer system is...

worm

rootkit

trojan

spyware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?