Search Header Logo

Year 8 - Cyber Security 1

Authored by G Rimmer

Computers

7th Grade

Used 97+ times

Year 8 - Cyber Security 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are emails pretending to be from someone else and using greed or fear to get the user to click on a link ?

Pharming

Phishing​

Trojan Horse

Ransomware

DDOS attack

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is a motivation for someone to attack a computer system?

Financial Gain

Ransomware

Hubris

Trojan Horse

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt


A ...... ..... is malware which hides itself within another innocent looking program.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

..... ........ is the protection of devices, services and networks – and the information on them – from theft or damage

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

........ is a way of redirecting a legitimate websites’ visitors to a fake website run by a hacker.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is a piece of malware that is installed on a computer and lock it out until a sum of money is paid to the hacker?

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A type of attack which is used to disrupt and slow down a company or business website by bombarding it with millions of requests.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?