Search Header Logo

Cyber Security Basics (Yr 11)

Authored by Azeez Ibrahim

Computers

11th Grade

Used 2+ times

Cyber Security Basics (Yr 11)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cyber attack involves fraudulent emails appearing to be from a legitimate source?

Phishing attack

Password attack

Man in the middle attack

DDoS attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cyber security practice involves creating dummy computer systems to attract attackers?

Implementing honeypots

Installing a firewall

Using unique alphanumeric passwords

Avoiding mails from unknown senders

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of an ethical hacker in cyber security?

Identifying vulnerabilities and resolving them

Designing robust security structures

Ensuring overall safety of information in an organization

Launching cyber attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall in cyber security?

To intercept communication lines

To steal sensitive data

To safeguard the network by filtering traffic

To attract attackers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cyber attack involves gaining access to networks for a prolonged period to continuously gain confidential information?

Malware Attack

SQL Injection Attack

Advanced Persistent Threat (APT)

Denial of Service Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main motive behind cyber attacks on public and private organizations?

To provide monetary gains

To tamper with crucial data

To ensure network security

To identify vulnerabilities

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cyber security professional is entrusted with the overall safety of information in an organization?

Network Administrator

Chief Information Security Officer (CISO)

Security Architect

Ethical Hacker

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?