
S2 cyber security plenary quiz 1
Authored by G Alexander-Doyle
Computers
9th - 12th Grade
Used 38+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a piece of software which records data entered at the keyboard?
Virus
Browser
Worm
Keystroke logger
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a piece of software which self-replicates and spreads itself through a computer network, using system resources as it goes?
Virus
Browser
Worm
Keystroke logger
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes the process of sending an e-mail made to look like it came from a legitimate company for the purpose of tricking people into giving away sensitive information?
Phishing
E-mail scam
Hacking
Keystroke logging
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Act of parliament was passed to make the creation and spread of malware along with hacking illegal?
The Data Protection Act
The Computer Misuse Act
The Copyright Designs & Patent's Act
The Malware Misuse Act
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The job of an e______ h_____ is to test the security of a computer system or network. They can then report back any vulnerabilities to the owner.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A f_______ is a piece of software which can be installed on a computer network to monitor incoming and outgoing traffic to ensure it is permitted.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?