Unit 13 Cyber Defense

Unit 13 Cyber Defense

8th Grade

20 Qs

quiz-placeholder

Similar activities

Youtube

Youtube

1st - 12th Grade

15 Qs

Sewing  Tools

Sewing Tools

7th - 8th Grade

15 Qs

Ôn tập 1,2,3 Tin học 8

Ôn tập 1,2,3 Tin học 8

8th Grade

15 Qs

Online Search Skills

Online Search Skills

7th - 12th Grade

16 Qs

ÔN TẬP CN8

ÔN TẬP CN8

8th Grade - University

20 Qs

GLOSARIO DE TERMINOS

GLOSARIO DE TERMINOS

7th - 11th Grade

20 Qs

Tin học 5-Ôn tập HK2 (24-25)

Tin học 5-Ôn tập HK2 (24-25)

5th Grade - University

20 Qs

Google Classroom

Google Classroom

KG - 12th Grade

16 Qs

Unit 13 Cyber Defense

Unit 13 Cyber Defense

Assessment

Quiz

Instructional Technology

8th Grade

Hard

CCSS
RI.11-12.5, RI.7.7, RI.6.5

+7

Standards-aligned

Created by

Kristie Hernandez

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a Distributed Denial of Service (DDoS) attack?
An attempt to deny access to a website by flooding the website’s servers with millions of requests from different computers
An attempt by a government to deny Internet access to its citizens
An attempt by one user to deny service to another user by posting malicious material on a social network
An attempt by an Internet user to access private information stored in a private database

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Cybercriminals typically look for a system _______ to exploit for their own benefit.
with vulnerabilities
with a virus
without a firewall
with a strong password

Tags

CCSS.RI.11-12.5

CCSS.RI.6.5

CCSS.RI.7.5

CCSS.RI.8.5

CCSS.RI.9-10.5

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

There has been a recent attack on the organization that you are interning for. Your manager knows that multiple computers were used to carry out the attack. Which type of attack uses more than one computer to carry out the attack?
DDos
Man-in-the-middle attack
Worm
XSS

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Your friend receives a DM (direct message) in her social media account. When she clicks on the link provided, she is prompted to put in her username and password. She doesn’t trust that this account is who they say they are. What type of attack attempts to insert a computer or system between two systems that are communicating?
Man-in-the-middle attack
DDos
Worm
XSS

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which type of attack blocks authorized users from accessing their network?
Dos
Social engineering
Rootkit
XSS

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You are using your browser to research a topic for an upcoming project. When you visit one site in particular, you are instantly redirected to a site that does not seem safe. What type of attack could you have just experienced?
XSS
DDos
SQLi
Worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is ransomware?
Software that holds your data hostage until you send the attackers money.
A form of cryptocurrency.
Software used to protect your computer from harmful viruses.
Computer equipment that is stolen and held hostage until you pay the attackers.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?