12 CSC ATAR - Cyber security
Quiz
•
Computers
•
12th Grade
•
Easy

Alex K
Used 11+ times
FREE Resource
Enhance your content
17 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Tick all that apply: APP 11 requires that APP entities...
Take active measures to ensure the security of personal information it holds, and to actively consider whether it is permitted to retain personal information.
Take reasonable steps to protect personal information from misuse, interference and loss, as well as unauthorised access, modification or disclosure.
Take reasonable steps to destroy or de-identify the personal information it holds once the personal information is no longer needed.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Masquerading as a trusted device or user by forging the source IP address in network packets.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Multiple sources coordinating an attack on a network, server, or website, by sending excessive network traffic to exhaust resources and make the resource unavailable to legitimate users.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Exploiting vulnerabilities in web applications to insert malicious SQL code into a database query, potentially leading to data theft or manipulation.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Injecting malicious scripts into otherwise trusted websites. These scripts can then run in the user's browser, potentially stealing information or hijacking sessions.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software flaws unknown to the software vendor and, therefore, for which no patch exists.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hidden method of bypassing normal authentication or encryption in a computer system, network, or software application, often installed by attackers.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
18 questions
Microsoft Stride Threat Taxonomy
Quiz
•
12th Grade
17 questions
TestOut IT Fundamentals Quiz 1
Quiz
•
10th - 12th Grade
22 questions
Blown to Bits Chapter 2 Vocab
Quiz
•
9th - 12th Grade
14 questions
L8 - Defense in Dept & VPN | ICSS Lesson Quiz
Quiz
•
12th Grade
15 questions
Topic 4 - Understanding System Vulnerabilities
Quiz
•
12th Grade - University
14 questions
Cyber Security Quiz
Quiz
•
12th Grade
13 questions
OCR ALevel CS: 1.3.2 Networks
Quiz
•
10th - 12th Grade
15 questions
Hackers Quiz
Quiz
•
12th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade