CNat IT TA4 with notes

CNat IT TA4 with notes

11th Grade

10 Qs

quiz-placeholder

Similar activities

ONLINE SAFETY

ONLINE SAFETY

11th Grade

15 Qs

ICT test by Michael

ICT test by Michael

11th Grade

10 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

societal impacts class12

societal impacts class12

KG - 12th Grade

10 Qs

Network Advantages and Disadvantages

Network Advantages and Disadvantages

10th Grade - University

15 Qs

EMPTECH Lesson 2 - STEM 1

EMPTECH Lesson 2 - STEM 1

11th Grade

8 Qs

IT Unit 11 Cyber Security Key Terms

IT Unit 11 Cyber Security Key Terms

11th - 12th Grade

10 Qs

J808 LO4.1.4 Hacking, 5 DDOS, 6 Pharming

J808 LO4.1.4 Hacking, 5 DDOS, 6 Pharming

10th - 11th Grade

15 Qs

CNat IT TA4 with notes

CNat IT TA4 with notes

Assessment

Passage

Computers

11th Grade

Easy

Created by

Ana Bracher

Used 8+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of a Denial of Service (DoS) attack?

To manipulate people into divulging confidential information

To install malicious software

To steal sensitive information

To make a computer network unavailable to users

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of hacking?

Silver hat hacking

Black hat hacking

Grey hat hacking

White hat hacking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A type of social engineering

A software that enhances computer performance

Malicious software installed without the user's knowledge

A tool for data recovery

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of social engineering?

Ransomware

Adware

Phishing

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of white hat hacking?

To identify loopholes and weaknesses

To troll or have fun

To steal and sell data

To install malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Worm

Baiting

Virus

Trojan horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does social engineering rely on?

Outdated antivirus software

Weaknesses in network security

Manipulating people

Technical flaws in software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?