Network security

Network security

8th - 9th Grade

10 Qs

quiz-placeholder

Similar activities

Cybercrime and Malware

Cybercrime and Malware

6th - 8th Grade

10 Qs

Malware

Malware

9th - 11th Grade

15 Qs

Malware Introduction

Malware Introduction

5th - 10th Grade

10 Qs

Virus and Anti-Virus

Virus and Anti-Virus

8th Grade

10 Qs

NETWORK SECURITY

NETWORK SECURITY

8th - 10th Grade

15 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Information & Internet Security

Information & Internet Security

9th - 12th Grade

15 Qs

Cybersecurity

Cybersecurity

9th - 11th Grade

14 Qs

Network security

Network security

Assessment

Quiz

Computers

8th - 9th Grade

Hard

Created by

Peter Hyland

Used 35+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is described as...

"software that is designed to gain access to your computer with malicious intent.software that is designed to gain access to your computer with malicious intent"

Phishing

Malware

Virus

Adware

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is described as...

"a malicious form of self-replicating software. Once on a computer or network, it will replicate itself by maliciously modifying other computer programs and inserting code"

Malware

Phishing

Trojan

Virus

3.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What is described as...

"This is a form of virus, as it is self-replicating. Specifically, it locks a computer, encrypts files, and therefore prevents the user from being able to access the data. The attacker will demand that a ransom be paid before they decrypt the files and unlock the computer."

Adware

Trojan

Ransomware

Worm

4.

FILL IN THE BLANK QUESTION

20 sec • 5 pts

What is described as...

"This is a form of attack that makes multiple attempts to discover something (such as a password)."

5.

FILL IN THE BLANK QUESTION

10 sec • 5 pts

What is the term for somebody watching you type your PIN into a cash machine?

6.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

How many sections are in the Computer Misuse Act (!979)

2

3

4

5

7.

FILL IN THE BLANK QUESTION

20 sec • 5 pts

What is... "a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes. Examples include Phishing and Blagging"

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?