BTEC cyber security

BTEC cyber security

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Kuis Keamanan Digital

Kuis Keamanan Digital

10th Grade

10 Qs

network security

network security

9th Grade

15 Qs

Types of Malware

Types of Malware

6th - 9th Grade

14 Qs

Malware

Malware

7th - 11th Grade

15 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

1.5.5 - Starter Task/Digital Footprint

1.5.5 - Starter Task/Digital Footprint

11th Grade

11 Qs

Sumatif 1 Dampak Sosial Informatika

Sumatif 1 Dampak Sosial Informatika

9th Grade - University

15 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

BTEC cyber security

BTEC cyber security

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

doxtorfrango 2.0

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the below describes a Firewall

Can be hardware or software based, they use a set of rules that filter suspicious network packets from remote networks.

Preventing unauthorized access

.Data stored by a web browser until it is closed.

A wall of fire used to stop viruses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Floods a computer

with requests so it is unable to

respond to legitimate

requests.

Denial of Service

(DDoS)

Malware

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed is known as?


Ransomware

Virus

Spam

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Between these two hackers, which one can you hire to help you in your company?

white hat

black hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a program that is used to detect, prevent, and remove malware?

Antivirus

Firewall

Adware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method used by attackers to trick users into giving them their passwords?

Phishing

SQL Injection

Brute Force Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the practice of sending fraudulent emails resembling emails from reputable sources, to steal personal information?

Phishing

Spoofing

Keylogging

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?