Riviosn_internet threats & computer system

Riviosn_internet threats & computer system

9th - 12th Grade

13 Qs

quiz-placeholder

Similar activities

1.2 Data Rep: Sound

1.2 Data Rep: Sound

8th - 10th Grade

17 Qs

AQA GCSE Computer Science - 3.1.4 Sorting Algorithms

AQA GCSE Computer Science - 3.1.4 Sorting Algorithms

8th - 10th Grade

18 Qs

Analogue or Digital?

Analogue or Digital?

10th - 12th Grade

16 Qs

Abstraction in Computer Science

Abstraction in Computer Science

9th - 11th Grade

15 Qs

A words - GCSE Computer Science

A words - GCSE Computer Science

1st - 10th Grade

13 Qs

Sampling Sound

Sampling Sound

7th - 11th Grade

16 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

IGCSE CS INPUT DEVICES

IGCSE CS INPUT DEVICES

9th - 11th Grade

15 Qs

Riviosn_internet threats & computer system

Riviosn_internet threats & computer system

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Amna D

Used 98+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Mona is the data security manager for a governmental organisation. One her desired goals of security is to ensure that the data can be accessed only by those who are allowed to see it. This is known as data ____________.

confidentiality

integrity

availability

publicity

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Salem opened an email attachment, but immediately after opening it, his computer froze, and all his files were encrypted. A few minutes later, a message appeared on the screen demanding that he pay 20,000 AED to remove the encryption!

What is the name of this cyberattack

Trojan horse

Scareware

Denial of Service (DOS)

Ransomware

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Lamia is working as a web developer in a company. The server of her company’s website started receiving too many requests that it could not handle. This led to service interruption, and the website is not working any more.

This type of attack is known as a ______________ attack.

brute-force

rootkit

Denial of Service (DOS)

backdoor

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which one of the below passwords is the most secure against password cracking attacks?

Password

P@55Word12!

PassWord12

WoRd5pas$_x_&&

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which one of the below passwords is the least usable for Amna for the user to enter on a mobile phone?

Password

MyPasswordConsistsOf50CharactersAnd8CapitalLetters

P@ssword123

Amna@2008

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Ahmad is trying to set a new password for his online bank account. He knows that the more complex the password is, it will be _________ secure against a password cracking attack, but that it will be the _____________ usable.

less, least

less, most

more, least

more, most

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

Look at the image concerning the levels of abstraction of how a computer works. Level C is known as the __________ domain of abstraction.

software

digital

analogue

structure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?