S2 cyber security plenary quiz 1

S2 cyber security plenary quiz 1

9th - 12th Grade

6 Qs

quiz-placeholder

Similar activities

AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

8th - 10th Grade

10 Qs

Y10 1.8

Y10 1.8

10th - 11th Grade

10 Qs

2023-2024-Term3-PM-DRAWING-SHS1-Activity-1

2023-2024-Term3-PM-DRAWING-SHS1-Activity-1

10th Grade

10 Qs

Ch 8.1 - System Hacking

Ch 8.1 - System Hacking

12th Grade

9 Qs

Threat Definition (9618 Computer Science)

Threat Definition (9618 Computer Science)

9th - 12th Grade

9 Qs

Rise of the bots | Exit Quiz | Oak National Academy

Rise of the bots | Exit Quiz | Oak National Academy

8th Grade - University

5 Qs

Cyber II: Malware Types

Cyber II: Malware Types

11th Grade

10 Qs

Computer Science Control Systems

Computer Science Control Systems

9th Grade

11 Qs

S2 cyber security plenary quiz 1

S2 cyber security plenary quiz 1

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

G Alexander-Doyle

Used 31+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is a piece of software which records data entered at the keyboard?

Virus

Browser

Worm

Keystroke logger

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is a piece of software which self-replicates and spreads itself through a computer network, using system resources as it goes?

Virus

Browser

Worm

Keystroke logger

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following describes the process of sending an e-mail made to look like it came from a legitimate company for the purpose of tricking people into giving away sensitive information?

Phishing

E-mail scam

Hacking

Keystroke logging

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which Act of parliament was passed to make the creation and spread of malware along with hacking illegal?

The Data Protection Act

The Computer Misuse Act

The Copyright Designs & Patent's Act

The Malware Misuse Act

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

The job of an e______ h_____ is to test the security of a computer system or network. They can then report back any vulnerabilities to the owner.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

A f_______ is a piece of software which can be installed on a computer network to monitor incoming and outgoing traffic to ensure it is permitted.