Cyber Security

Cyber Security

12th Grade

10 Qs

quiz-placeholder

Similar activities

G9-ICT-CSS-Quiz#2 Hardware and Software

G9-ICT-CSS-Quiz#2 Hardware and Software

9th - 12th Grade

10 Qs

March Mock Extended Do Now

March Mock Extended Do Now

12th Grade

12 Qs

Networks LAN and WAN

Networks LAN and WAN

7th - 12th Grade

10 Qs

3.1 Area of Computer Ethics

3.1 Area of Computer Ethics

12th Grade

12 Qs

Cybersecurity - Device Security

Cybersecurity - Device Security

9th - 12th Grade

10 Qs

Networking

Networking

9th - 12th Grade

15 Qs

BTEC IT L3 - IT Systems & online services

BTEC IT L3 - IT Systems & online services

11th Grade - University

15 Qs

LO2 Understanding Computer Software

LO2 Understanding Computer Software

11th - 12th Grade

15 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Alex McCluskey

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of computer or system is most vulnerable to network attacks?

A desktop computer connected to a wired LAN

A laptop computer connected to a public Wi-Fi hotspot

A smartphone connected to a cellular network

A tablet computer connected to a Bluetooth speaker

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best practice for setting file permissions or privileges in an organisation?

Granting full access to everyone

Granting read-only access to everyone

Granting access based on the principle of least privilege

Granting access based on the principle of most privilege

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the risk of installing software from an untrustworthy source or downloading illegal copies of software?

The software may contain malware or spyware that can compromise the security of the system or data

The software may not work properly or have bugs that can affect the performance of the system or data

The software may violate the intellectual property rights of the original developer or publisher

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to keep the operating system updated and supported?

To fix any security vulnerabilities or bugs that may be exploited by attackers

To add new features or functionalities that may improve the user experience or productivity

To maintain compatibility with other software or hardware components that may change over time

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the main challenges of securing mobile devices?

Mobile devices are more prone to physical theft or loss than desktop computers

Mobile devices rely on OEMs to update the system software, which may be delayed or unavailable

Mobile devices use wireless connections that may be intercepted or hacked by attackers

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the most common methods of physical security breach?

Using a USB storage device with malicious code or sensitive data

Breaking into a locked room or cabinet where equipment or data is stored

Collecting passwords and other information by social-engineering methods such as phishing or impersonation

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some of the security implications of cloud computing and IoT devices?

The data stored in the cloud or transmitted by IoT devices may be accessed by unauthorized parties or compromised by hackers

The cloud service provider or IoT device manufacturer may have access to the data or control over the device, which may pose privacy or ethical issues

The cloud service or IoT device may depend on internet connectivity, which may be unreliable or disrupted by attackers

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?