
Staying safe online 3: hacking and DoS attacks
Authored by Nick Allen
Computers
7th Grade
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is hacking?
a collection of zombie devices
a computer system on a network
an attack on a server by so many fake requests that the server can't deal with them
attempting to access data held on a device without permission
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a hotspot?
a place where you can connect a device to a public Wi-Fi network
a business or organisation that is is undergoing a denial of service attack
a place where hackers ends up when he, she or they have been caught
software that a hacker installs on your device to monitor what you do
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a zombie device?
a device that was broken but has been repaired
a device that can connect to a public Wi-Fi network
a device that a hacker can control
a computer system on a network
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a server?
a place where you can connect a device to a public Wi-Fi network
a computer system on a network that provides a function such as hosting websites, files or online games
someone who brings you a drink and a sandwich while you're at your computer
software that monitors what you do on a device and sends personal data to the hacker
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a botnet?
a collection of zombie devices under the control of a hacker
when a server on a network is sent too many fake requests for it to deal with them effectively
a place where you can connect a device to a public Wi-Fi network
software that monitors what you do on a device and sends personal data to the hacker
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a denial of service (DoS) attack?
when a shopkeeper refuses to serve someone
an attempt to access data held on a device without permission
when a server on a network is sent too many fake requests for it to deal with effectively
when a hacker gathers personal data using spyware
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following devices could a hacker take control of and become zombie devices?
smart refrigerator
smart phone
smart washing machine
laptop
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
hardware and software(g3)
Quiz
•
2nd - 10th Grade
9 questions
Microbit Features Activity
Quiz
•
6th - 8th Grade
10 questions
DBMS- CLASS8 CBSE
Quiz
•
7th - 10th Grade
10 questions
JSPS Competition Hackathon - Scratch Language - Grade 1
Quiz
•
2nd Grade - University
13 questions
Diagnostico bases Informática
Quiz
•
1st - 12th Grade
10 questions
Cultura Digital 1º Trimestre (6º)
Quiz
•
5th - 12th Grade
10 questions
QBASIC Programming
Quiz
•
5th - 10th Grade
10 questions
Cos’è la ROM?
Quiz
•
6th - 12th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade