Search Header Logo

12 CSC ATAR - Cyber security

Authored by Alex K

Computers

12th Grade

Used 11+ times

12 CSC ATAR - Cyber security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all that apply: APP 11 requires that APP entities...

Take active measures to ensure the security of personal information it holds, and to actively consider whether it is permitted to retain personal information.

Take reasonable steps to protect personal information from misuse, interference and loss, as well as unauthorised access, modification or disclosure.

Take reasonable steps to destroy or de-identify the personal information it holds once the personal information is no longer needed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Masquerading as a trusted device or user by forging the source IP address in network packets.

Social engineering (phishing)

Distributed denial of service

Back door

IP spoofing

SQL Injection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multiple sources coordinating an attack on a network, server, or website, by sending excessive network traffic to exhaust resources and make the resource unavailable to legitimate users.

Social engineering (phishing)

Distributed denial of service

Back door

IP spoofing

SQL Injection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Exploiting vulnerabilities in web applications to insert malicious SQL code into a database query, potentially leading to data theft or manipulation.

Social engineering (phishing)

Distributed denial of service

Back door

IP spoofing

SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Injecting malicious scripts into otherwise trusted websites. These scripts can then run in the user's browser, potentially stealing information or hijacking sessions.

Man-in-the-middle (MITM)

Cross-site scripting (XSS)

Zero day vulnerabilities

Back door

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software flaws unknown to the software vendor and, therefore, for which no patch exists.

Man-in-the-middle (MITM)

Cross-site scripting (XSS)

Zero day vulnerabilities

Back door

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hidden method of bypassing normal authentication or encryption in a computer system, network, or software application, often installed by attackers.

Man-in-the-middle (MITM)

Cross-site scripting (XSS)

Zero day vulnerabilities

Back door

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?