Studio - U3 - L02.1 Threats to Cyber Security

Studio - U3 - L02.1 Threats to Cyber Security

9th Grade

10 Qs

quiz-placeholder

Similar activities

CYBER THREATS

CYBER THREATS

7th - 9th Grade

8 Qs

Phishing

Phishing

7th - 9th Grade

15 Qs

Unit 1.3 Wired & Wireless Networks: MCQs 2

Unit 1.3 Wired & Wireless Networks: MCQs 2

7th - 11th Grade

10 Qs

J277 1.4 Network Security Quiz (Forms of Attack)

J277 1.4 Network Security Quiz (Forms of Attack)

9th - 12th Grade

13 Qs

Network Security

Network Security

9th Grade

13 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Computer General 2

Computer General 2

8th - 10th Grade

15 Qs

Y9 Social Engineering

Y9 Social Engineering

9th Grade

10 Qs

Studio - U3 - L02.1 Threats to Cyber Security

Studio - U3 - L02.1 Threats to Cyber Security

Assessment

Quiz

Computers

9th Grade

Easy

Created by

Andy Johnson

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of access management in the context of cyber security?

Managing the access to a library

Managing the access to a physical building

Managing the access to social media accounts

Managing the access to a computer system/network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does account lockout refer to in the context of cyber security?

Locking a user out of their email account

Locking an account for several hours after multiple failed login attempts

Locking an account after a user changes their password

Locking an account if the user doesn't log in for a certain period

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of anti-malware software in cyber security?

To track online purchases

To prevent, detect, and eradicate malicious software

To create secure passwords

To manage social media accounts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a botnet refer to in the context of cyber security?

A network of computers used for cloud computing

A network of computers used for scientific research

A network of computers used for online gaming

A network of computers infected with malicious software and controlled without the owners’ knowledge

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of encryption in cyber security?

To slow down computer systems

To ensure data security by using encrypted code

To create new software applications

To monitor network traffic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of social engineering in the context of cyber security?

An attack vector that relies heavily on human interaction and often involves manipulating people

A method of testing the security of software

A method of gaining unauthorised access to a computer system/network

A method of preventing unauthorised access to a computer system/network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does organised crime refer to in the context of cyber security?

Criminal groups that carry out espionage and military operations

Criminal groups that are motivated by political activism

Criminal groups that are motivated by peer kudos

Criminal groups that are motivated by financial reward

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?