Unit 13 Cyber Defense

Unit 13 Cyber Defense

8th Grade

20 Qs

quiz-placeholder

Similar activities

Cyber Awareness Quiz

Cyber Awareness Quiz

6th - 8th Grade

15 Qs

Digital Citizenship

Digital Citizenship

5th - 12th Grade

15 Qs

hackers

hackers

6th - 8th Grade

19 Qs

Product Design Year 8 DREAMHOUSE SKETCHUP

Product Design Year 8 DREAMHOUSE SKETCHUP

8th Grade

20 Qs

Google Searches

Google Searches

5th - 8th Grade

17 Qs

Coding DA

Coding DA

6th - 8th Grade

25 Qs

6th grade Don't feed the Phish Vocab

6th grade Don't feed the Phish Vocab

6th - 8th Grade

18 Qs

Parts of a Computer and Vocabulary Quiz

Parts of a Computer and Vocabulary Quiz

6th - 8th Grade

22 Qs

Unit 13 Cyber Defense

Unit 13 Cyber Defense

Assessment

Quiz

Instructional Technology

8th Grade

Hard

CCSS
RI.8.5, RL.8.7, RI.7.5

+7

Standards-aligned

Created by

Kristie Hernandez

Used 8+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a Distributed Denial of Service (DDoS) attack?
An attempt to deny access to a website by flooding the website’s servers with millions of requests from different computers
An attempt by a government to deny Internet access to its citizens
An attempt by one user to deny service to another user by posting malicious material on a social network
An attempt by an Internet user to access private information stored in a private database

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Cybercriminals typically look for a system _______ to exploit for their own benefit.
with vulnerabilities
with a virus
without a firewall
with a strong password

Tags

CCSS.RI.8.5

CCSS.RI.7.5

CCSS.RI.6.5

CCSS.RI.9-10.5

CCSS.RI.5.5

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

There has been a recent attack on the organization that you are interning for. Your manager knows that multiple computers were used to carry out the attack. Which type of attack uses more than one computer to carry out the attack?
DDos
Man-in-the-middle attack
Worm
XSS

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Your friend receives a DM (direct message) in her social media account. When she clicks on the link provided, she is prompted to put in her username and password. She doesn’t trust that this account is who they say they are. What type of attack attempts to insert a computer or system between two systems that are communicating?
Man-in-the-middle attack
DDos
Worm
XSS

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which type of attack blocks authorized users from accessing their network?
Dos
Social engineering
Rootkit
XSS

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You are using your browser to research a topic for an upcoming project. When you visit one site in particular, you are instantly redirected to a site that does not seem safe. What type of attack could you have just experienced?
XSS
DDos
SQLi
Worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is ransomware?
Software that holds your data hostage until you send the attackers money.
A form of cryptocurrency.
Software used to protect your computer from harmful viruses.
Computer equipment that is stolen and held hostage until you pay the attackers.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?