Pearson 1CP2 - 5.2 - Cyber and Malware

Pearson 1CP2 - 5.2 - Cyber and Malware

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Malware and Encryption Quiz

Malware and Encryption Quiz

12th Grade

20 Qs

BTEC L3 - D - Protecting Data Antivirus

BTEC L3 - D - Protecting Data Antivirus

7th - 12th Grade

20 Qs

MALWARE

MALWARE

9th Grade

20 Qs

Viruses and Malware

Viruses and Malware

7th - 9th Grade

20 Qs

Malware Kelas 9 SMP

Malware Kelas 9 SMP

9th Grade

20 Qs

Identifying Security Threats

Identifying Security Threats

9th - 12th Grade

21 Qs

Cyber Security Quiz

Cyber Security Quiz

9th Grade

24 Qs

BTEC IT Unit 1 - D threats to data & laws

BTEC IT Unit 1 - D threats to data & laws

11th - 12th Grade

20 Qs

Pearson 1CP2 - 5.2 - Cyber and Malware

Pearson 1CP2 - 5.2 - Cyber and Malware

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Paul Meehan

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term do we use to describe the protection of computer systems from unauthorised access or being damaged or made inaccessible?

Network security
Data science
Cybersecurity
Software development

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Cyber security aims to prevent these three things

unauthorised access

damage to a system

hackers making a system inaccessible

a system being used to attack another

a system crashing due to errors in its programming

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A significant portion of data held by the government and the military is deemed ??? and access to this by third parties needs to be prevented.

sensitive

public
restricted

classified

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Financial data or personal data (relating to an individual) is deemed...

Non-sensitive
Open
Sensitive
Public

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call any kind of electronic attack on a computer system, server, network or other IT device?

Phishing
Cyberattack
Malware
Data breach

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cyber attacks may be used to gain ??? to data contained within the system

access
control
exit
entry

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cyber attacks may be used to delete or ??? information

encrypt

steal

hide

modify

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?