Search Header Logo

Information & Internet Security

Authored by AJ Rovers

Computers

9th - 12th Grade

Used 30+ times

Information & Internet Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a cyberattack?

Steal a laptop from the computer shop

Send a fake email in order to get login credentials

Offer free vouchers without buying anything

Search the information from the dustbin

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call a person who carries the cyberattack?

Terrorist

Punisher

Leader

Hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The followings are the examples of malware EXCEPT

hardware

adware

trojan horse

spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attacker sends the fraudulent email in order to steal your sensitive data. This method is referred as ______ attack.

phishing

pharming

botnet

denial of service

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the type of cyberattack where the hackers' system takes over the client's IP address.

DDOS attack

Man-in-the-middle attack

Phishing attack

Password attack

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A strong password should have these criteria. (Tick all that apply)

minimum 8 characters

contains common words

start with number

hard to guess

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

How do we prevent future cyberattacks? (Tick all that apply)

Share sensitive data with public

Install firewall

Implemented honey pots

Use strong password

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?