
Information & Internet Security
Authored by AJ Rovers
Computers
9th - 12th Grade
Used 30+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a cyberattack?
Steal a laptop from the computer shop
Send a fake email in order to get login credentials
Offer free vouchers without buying anything
Search the information from the dustbin
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call a person who carries the cyberattack?
Terrorist
Punisher
Leader
Hacker
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The followings are the examples of malware EXCEPT
hardware
adware
trojan horse
spyware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The attacker sends the fraudulent email in order to steal your sensitive data. This method is referred as ______ attack.
phishing
pharming
botnet
denial of service
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the type of cyberattack where the hackers' system takes over the client's IP address.
DDOS attack
Man-in-the-middle attack
Phishing attack
Password attack
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A strong password should have these criteria. (Tick all that apply)
minimum 8 characters
contains common words
start with number
hard to guess
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
How do we prevent future cyberattacks? (Tick all that apply)
Share sensitive data with public
Install firewall
Implemented honey pots
Use strong password
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?