12 CSC ATAR - Cyber security

Quiz
•
Computers
•
12th Grade
•
Easy

Alex K
Used 10+ times
FREE Resource
17 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Tick all that apply: APP 11 requires that APP entities...
Take active measures to ensure the security of personal information it holds, and to actively consider whether it is permitted to retain personal information.
Take reasonable steps to protect personal information from misuse, interference and loss, as well as unauthorised access, modification or disclosure.
Take reasonable steps to destroy or de-identify the personal information it holds once the personal information is no longer needed.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Masquerading as a trusted device or user by forging the source IP address in network packets.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Multiple sources coordinating an attack on a network, server, or website, by sending excessive network traffic to exhaust resources and make the resource unavailable to legitimate users.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Exploiting vulnerabilities in web applications to insert malicious SQL code into a database query, potentially leading to data theft or manipulation.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Injecting malicious scripts into otherwise trusted websites. These scripts can then run in the user's browser, potentially stealing information or hijacking sessions.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software flaws unknown to the software vendor and, therefore, for which no patch exists.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hidden method of bypassing normal authentication or encryption in a computer system, network, or software application, often installed by attackers.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
20 questions
Cybersecurity Awareness

Quiz
•
12th Grade
14 questions
YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

Quiz
•
8th Grade - University
20 questions
Computer Security Measures

Quiz
•
11th Grade - University
20 questions
Induction Unit 7 Assessment

Quiz
•
12th Grade
20 questions
MTA - Mobility and Devices Fundamentals Part 1

Quiz
•
10th Grade - Professi...
20 questions
Cybersecurity2

Quiz
•
12th Grade
20 questions
security best practices

Quiz
•
10th Grade - University
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
10 questions
Afterschool Activities & Sports

Quiz
•
6th - 8th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
15 questions
Cool Tool:Chromebook

Quiz
•
6th - 8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
20 questions
Bullying

Quiz
•
7th Grade
18 questions
7SS - 30a - Budgeting

Quiz
•
6th - 8th Grade