ICT revision source

ICT revision source

7th - 8th Grade

7 Qs

quiz-placeholder

Similar activities

Guess The Youtuber

Guess The Youtuber

5th - 8th Grade

10 Qs

HTML

HTML

KG - 9th Grade

11 Qs

Encryption and Public Keys

Encryption and Public Keys

6th - 8th Grade

8 Qs

Typing Review

Typing Review

5th - 8th Grade

12 Qs

fnaf sister location

fnaf sister location

4th Grade - University

10 Qs

PLTW

PLTW

7th Grade

12 Qs

RB-3 (Chapter 8 Data Protection and Security)(CD)

RB-3 (Chapter 8 Data Protection and Security)(CD)

7th - 8th Grade

10 Qs

ICT revision source

ICT revision source

Assessment

Quiz

Computers

7th - 8th Grade

Medium

Created by

Rafaella Gabriel

Used 3+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a black hat hacker

A person with a black hat

Ties the components together

Skilled hackers who work for criminal organisations through the dark web

Algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a white hat hacker?

Work for a business and attempt to hack into their own system to try make it secure.

DDoS

Hackers flood the server with internet traffic

A white hat for a hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a grey hat hacker?

A hacker that is "good"

Look for vulnerabilities in a system without permission but they don't damage or steal any files.

A grey hat for a grey hacker

Someone who helps you to not get hacked

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does DDoS stand for?

Donut Dips on Stand

Dangerous Damage of Security

Dark Drive of Secret

Distributed Denial of Service

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is DDoS?

Hackers flood a server with internet traffic to stop a person accessing online traffic.

Denial of dangerous services on your network

star network topology

Algorithm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When was the Computer Misuse Act made?

1990

algorithm

1999

1989

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first Computer Misuse Act?

Unauthorised access to computer material

Unauthorised request from the bank

Deleting data without permission

LAN