
CyperSecurity_All
Authored by adelsaeed adelsaeed
Computers
6th - 8th Grade
Used 19+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Information can be accessed only by those who should see it. In cybersecurity, this is known as ...................
confidentiality
integrity
availability
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
___________ is an exchange where one gives up one thing in order to get something else that one also wants.
trade-off
cybersecurity
malware
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
______________ cyberattack tries to send huge amount of network traffic to the host until it stops working.
distribution of servers
denial of service
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
___________ malware delivers advertisements to the user on a web browser automatically.
adware
trojan horse
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
___________ malware replicates itself and spreads from one computer to another through the network.
adware
worm
spyware
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The degree to which something is fit to be used is known as usability.
True
False
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which password from below is the most difficult for a brute-force cyberattack to find?
Password
admin
Hi_People@123
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?