12 CSC ATAR - Cyber security

12 CSC ATAR - Cyber security

12th Grade

17 Qs

quiz-placeholder

Similar activities

Data Transmission Security

Data Transmission Security

9th - 12th Grade

15 Qs

OCR IT. Unit 3 - Cyber Security. LO2 test:

OCR IT. Unit 3 - Cyber Security. LO2 test:

11th - 12th Grade

20 Qs

network structures

network structures

12th Grade

20 Qs

Computer Security Measures

Computer Security Measures

12th Grade - University

19 Qs

Cyber Security

Cyber Security

9th Grade - University

20 Qs

Quiz on the OSI Model Basics

Quiz on the OSI Model Basics

12th Grade - University

20 Qs

Fundamentals 18 Understanding DDoS Attacks

Fundamentals 18 Understanding DDoS Attacks

9th Grade - University

20 Qs

Module 22 - Wireless Networks 3

Module 22 - Wireless Networks 3

9th - 12th Grade

19 Qs

12 CSC ATAR - Cyber security

12 CSC ATAR - Cyber security

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Alex K

Used 11+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all that apply: APP 11 requires that APP entities...

Take active measures to ensure the security of personal information it holds, and to actively consider whether it is permitted to retain personal information.

Take reasonable steps to protect personal information from misuse, interference and loss, as well as unauthorised access, modification or disclosure.

Take reasonable steps to destroy or de-identify the personal information it holds once the personal information is no longer needed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Masquerading as a trusted device or user by forging the source IP address in network packets.

Social engineering (phishing)

Distributed denial of service

Back door

IP spoofing

SQL Injection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multiple sources coordinating an attack on a network, server, or website, by sending excessive network traffic to exhaust resources and make the resource unavailable to legitimate users.

Social engineering (phishing)

Distributed denial of service

Back door

IP spoofing

SQL Injection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Exploiting vulnerabilities in web applications to insert malicious SQL code into a database query, potentially leading to data theft or manipulation.

Social engineering (phishing)

Distributed denial of service

Back door

IP spoofing

SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Injecting malicious scripts into otherwise trusted websites. These scripts can then run in the user's browser, potentially stealing information or hijacking sessions.

Man-in-the-middle (MITM)

Cross-site scripting (XSS)

Zero day vulnerabilities

Back door

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software flaws unknown to the software vendor and, therefore, for which no patch exists.

Man-in-the-middle (MITM)

Cross-site scripting (XSS)

Zero day vulnerabilities

Back door

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hidden method of bypassing normal authentication or encryption in a computer system, network, or software application, often installed by attackers.

Man-in-the-middle (MITM)

Cross-site scripting (XSS)

Zero day vulnerabilities

Back door

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers