BTEC cyber security

BTEC cyber security

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Կիբեռանվտանգության հարցեր

Կիբեռանվտանգության հարցեր

10th Grade

10 Qs

TESTING

TESTING

9th Grade

10 Qs

Network Security

Network Security

9th Grade

13 Qs

BTEC IT Unit 1 - D1 Threats to data

BTEC IT Unit 1 - D1 Threats to data

10th - 12th Grade

15 Qs

Seguridad Digital Quiz

Seguridad Digital Quiz

12th Grade

14 Qs

cyber safety

cyber safety

9th Grade

11 Qs

Threats to data

Threats to data

10th Grade

15 Qs

Their Security Quiz

Their Security Quiz

12th Grade

11 Qs

BTEC cyber security

BTEC cyber security

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

doxtorfrango 2.0

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the below describes a Firewall

Can be hardware or software based, they use a set of rules that filter suspicious network packets from remote networks.

Preventing unauthorized access

.Data stored by a web browser until it is closed.

A wall of fire used to stop viruses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Floods a computer

with requests so it is unable to

respond to legitimate

requests.

Denial of Service

(DDoS)

Malware

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed is known as?


Ransomware

Virus

Spam

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Between these two hackers, which one can you hire to help you in your company?

white hat

black hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a program that is used to detect, prevent, and remove malware?

Antivirus

Firewall

Adware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method used by attackers to trick users into giving them their passwords?

Phishing

SQL Injection

Brute Force Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the practice of sending fraudulent emails resembling emails from reputable sources, to steal personal information?

Phishing

Spoofing

Keylogging

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?