ck1 10 adv 1 review

ck1 10 adv 1 review

3rd Grade

8 Qs

quiz-placeholder

Similar activities

Passwords

Passwords

1st - 3rd Grade

10 Qs

Digital Vocabulary

Digital Vocabulary

3rd - 5th Grade

10 Qs

Internet Safety

Internet Safety

3rd - 6th Grade

10 Qs

Talking Safely Online-Lesson 3

Talking Safely Online-Lesson 3

3rd - 5th Grade

12 Qs

Computer Programming

Computer Programming

1st - 6th Grade

8 Qs

Level 2 Recap

Level 2 Recap

1st - 4th Grade

10 Qs

Operating System and Windows 10

Operating System and Windows 10

3rd Grade

10 Qs

FHM Tech

FHM Tech

1st - 8th Grade

12 Qs

ck1 10 adv 1 review

ck1 10 adv 1 review

Assessment

Quiz

Computers

3rd Grade

Medium

Created by

sajedah al-hilo

Used 14+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Noora is the social media manager for a governmental organisation. The information for these types of accounts should only be accessed by those who are assigned by the organisation. 

Protecting data in this way is an example of data ____________. 

a.     confidentiality

d.     publicity

c.     availability

b.     integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Noora opened an email attachment, but immediately after opening it, her computer froze, and all her files were encrypted. A few minutes later, a message appeared on screen demanding that she pay 10,000 AED to a specific account to remove the encryption!

 

What is the name of this cyberattack?

a.     Trojan horse

d.     Ransomware

c.     Denial of Service (DOS)

b.     Scareware

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alia opened a file that was on her USB drive at work. Immediately her computer slowed and did not function as expected. Shortly afterwards a number of work colleagues on the same network noticed their computers slowing down and not working as normal. It seems like all the computers on the network reported the same thing.

 

What type of attack was used to infect all the computers in the work network?

a.     Adware

d.     On-path attack

c.     Social engineering

b.     Worms

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Khaled has just been the victim of a password attack. He used the password ‘password’ for all his bank accounts and social media accounts.

 

By using the common used password ‘password’, the cybercriminal was able to gain access to Khaled’s account and many others by using the _________ technique. This technique tries the same common password across many usernames.

a.     brute-force

d.     dictionary

c.     password spraying

b.     rainbow

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which one of the below passwords is the most secure against password cracking attacks?

 

a.     Password

d.     WoRd5pas$_x_&&

c.     PassWord12

b.     P@55Word12!

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Ahmad is trying to set a new password for his online bank account. He knows that the __________ complex the password is, it will be _________ secure against a password cracking attack, but that it will be the _____________ usable.

 

a.    less, more, least

d.    more, more, least

c.     less, more, most

b.    more, less, most

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

Look at the image to the right concerning the levels of abstraction of how a computer works.

 

Level B is known as the __________ domain of abstraction.

 

a.    software

d.    structure

c.     analogue

b.    digital

8.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Within the layers of abstraction in the software domain, _________________ interface with the hardware.

a.    applications

d.    operating systems

c.     libraries

b.    programming languages