T-Level DBS RCE 10 - Revision Quiz No 1

T-Level DBS RCE 10 - Revision Quiz No 1

12th Grade

25 Qs

quiz-placeholder

Similar activities

G11&&12_Quiz1_2024_Cybersecurity

G11&&12_Quiz1_2024_Cybersecurity

12th Grade

20 Qs

Identifying Security Threats

Identifying Security Threats

9th - 12th Grade

21 Qs

CyberSecurity Test Review (FCs)

CyberSecurity Test Review (FCs)

9th - 12th Grade

20 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

Hackers & Cyber Attacks

Hackers & Cyber Attacks

12th Grade

21 Qs

Blown to Bits Chapter 2 Vocab

Blown to Bits Chapter 2 Vocab

9th - 12th Grade

22 Qs

Cybersecurity Unit 1 Exam preparation

Cybersecurity Unit 1 Exam preparation

11th - 12th Grade

20 Qs

Keamanan Jaringan ( Firewall )

Keamanan Jaringan ( Firewall )

12th Grade

20 Qs

T-Level DBS RCE 10 - Revision Quiz No 1

T-Level DBS RCE 10 - Revision Quiz No 1

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Elizabeth Gist

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Also known as an ethical hacker

Grey hat

White hat

Black hat

Yellow Hat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information stored on a computer system/network must be protected against unintended or unauthorised access.

Integrity

Confidentiality

Availability

Conformity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewall that is using rules based on the where the traffic is coming from

Traffic Type

Application Type

Source Type

Router Type

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Technical Vulnerability

Out of date firmware

Poor cyber hygiene

Physical access controls

Competency of staff

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Non technical threat

SQL Injection

Malware

Botnet

Natural Disaster

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Creations of the mind, such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce

Botnet

Intellectual Property

Regulation of investigatory powers act

Copyright

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Floods systems, servers, or networks with traffic to exhaust resources and bandwidth.

As a result, the system is unable to fulfill legitimate requests

SQL Injection

DOS

DNS Tunneling

Malware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers