Internet Security

Internet Security

9th Grade

10 Qs

quiz-placeholder

Similar activities

หน่วยที่ 1 ความรู้พื้นฐานการจัดการ ข้อมูลขนาดใหญ่ (Big Data)

หน่วยที่ 1 ความรู้พื้นฐานการจัดการ ข้อมูลขนาดใหญ่ (Big Data)

9th - 12th Grade

15 Qs

Hour of Code

Hour of Code

2nd - 12th Grade

10 Qs

CĐ 10: ĐỊNH DẠNG BÀI TRÌNH CHIẾU

CĐ 10: ĐỊNH DẠNG BÀI TRÌNH CHIẾU

9th Grade

11 Qs

NHTW Programming

NHTW Programming

9th Grade

10 Qs

Access - Lesson 14

Access - Lesson 14

9th - 12th Grade

10 Qs

CSS9_Q3M3L1_QUIZ5

CSS9_Q3M3L1_QUIZ5

9th Grade

11 Qs

Activity 1: How well do you know Java?

Activity 1: How well do you know Java?

9th Grade

10 Qs

Wee Word Intro

Wee Word Intro

7th - 12th Grade

12 Qs

Internet Security

Internet Security

Assessment

Quiz

Computers

9th Grade

Practice Problem

Medium

Created by

Haris Receminto

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a misleading website?

Malware

Cybersquatting

Firewall

Wikipedia

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is FALSE about malware?

It is a type of program that replicates itself.

It causes the computer to malfunction.

It may delete or corrupt files without a user’s knowledge.

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following attacks, an e-mail recipient is mislead to a bogus website?

Phishing

Hacking

Brute force attack

SQL injection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following filters spam emails?

Anti-virus software

Email service providers

Internet service providers

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker tries as many possible combinations of username and passwords to gain access to a web server. What is this called __________.

Denial of service attack

Data interception and theft

Phishing

Brute force attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a brute-force attack be delayed?

Using CAPTCHA

ISPs rejects access to attackers

Using anti-malware software

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a firewall?

Filters emails sent by an attacker

Prevents malware and hackers from accessing a system

Blocks unauthorised access in to and out of a network

All of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?