
12 CSC ATAR - Cyber security
Authored by Alex K
Computers
12th Grade
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
17 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Tick all that apply: APP 11 requires that APP entities...
Take active measures to ensure the security of personal information it holds, and to actively consider whether it is permitted to retain personal information.
Take reasonable steps to protect personal information from misuse, interference and loss, as well as unauthorised access, modification or disclosure.
Take reasonable steps to destroy or de-identify the personal information it holds once the personal information is no longer needed.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Masquerading as a trusted device or user by forging the source IP address in network packets.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Multiple sources coordinating an attack on a network, server, or website, by sending excessive network traffic to exhaust resources and make the resource unavailable to legitimate users.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Exploiting vulnerabilities in web applications to insert malicious SQL code into a database query, potentially leading to data theft or manipulation.
Social engineering (phishing)
Distributed denial of service
Back door
IP spoofing
SQL Injection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Injecting malicious scripts into otherwise trusted websites. These scripts can then run in the user's browser, potentially stealing information or hijacking sessions.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software flaws unknown to the software vendor and, therefore, for which no patch exists.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hidden method of bypassing normal authentication or encryption in a computer system, network, or software application, often installed by attackers.
Man-in-the-middle (MITM)
Cross-site scripting (XSS)
Zero day vulnerabilities
Back door
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?