CyperSecurity_All

CyperSecurity_All

6th - 8th Grade

20 Qs

quiz-placeholder

Similar activities

Y7 - Cybersecurity

Y7 - Cybersecurity

6th Grade

19 Qs

Year 7 October

Year 7 October

7th Grade

15 Qs

Cyber Security

Cyber Security

8th - 12th Grade

20 Qs

GCSE J277 - 1.4.1 - Network Threats

GCSE J277 - 1.4.1 - Network Threats

7th Grade

20 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

ICT Cybersecurity L4-Protect Device & Security Threats

ICT Cybersecurity L4-Protect Device & Security Threats

6th - 8th Grade

20 Qs

Cybersecurity 1

Cybersecurity 1

8th Grade

18 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

CyperSecurity_All

CyperSecurity_All

Assessment

Quiz

Computers

6th - 8th Grade

Medium

Created by

adelsaeed adelsaeed

Used 19+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Information can be accessed only by those who should see it. In cybersecurity, this is known as ...................

confidentiality

integrity

availability

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

___________ is an exchange where one gives up one thing in order to get something else that one also wants.

trade-off

cybersecurity

malware

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

______________ cyberattack tries to send huge amount of network traffic to the host until it stops working.

distribution of servers

denial of service

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 

___________ malware delivers advertisements to the user on a web browser automatically.

adware

trojan horse

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 

___________ malware replicates itself and spreads from one computer to another through the network.

adware

worm

spyware

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The degree to which something is fit to be used is known as usability.

True

False

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which password from below is the most difficult for a brute-force cyberattack to find?

Password

admin

Hi_People@123

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?