12 CSC ATAR - Cyber security

12 CSC ATAR - Cyber security

12th Grade

17 Qs

quiz-placeholder

Similar activities

040_An Overview of Malware – CompTIA Security+ SY0-701

040_An Overview of Malware – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

L8 - Defense in Dept & VPN | ICSS Lesson Quiz

L8 - Defense in Dept & VPN | ICSS Lesson Quiz

12th Grade

14 Qs

Topic 4 - Understanding System Vulnerabilities

Topic 4 - Understanding System Vulnerabilities

12th Grade - University

15 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

Cyber Security Quiz

Cyber Security Quiz

12th Grade

14 Qs

Quiz1_12&11_2t_20214

Quiz1_12&11_2t_20214

12th Grade

20 Qs

Final cybersecurity exam (A)

Final cybersecurity exam (A)

9th - 12th Grade

21 Qs

security best practices

security best practices

10th Grade - University

20 Qs

12 CSC ATAR - Cyber security

12 CSC ATAR - Cyber security

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Alex K

Used 10+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all that apply: APP 11 requires that APP entities...

Take active measures to ensure the security of personal information it holds, and to actively consider whether it is permitted to retain personal information.

Take reasonable steps to protect personal information from misuse, interference and loss, as well as unauthorised access, modification or disclosure.

Take reasonable steps to destroy or de-identify the personal information it holds once the personal information is no longer needed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Masquerading as a trusted device or user by forging the source IP address in network packets.

Social engineering (phishing)

Distributed denial of service

Back door

IP spoofing

SQL Injection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multiple sources coordinating an attack on a network, server, or website, by sending excessive network traffic to exhaust resources and make the resource unavailable to legitimate users.

Social engineering (phishing)

Distributed denial of service

Back door

IP spoofing

SQL Injection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Exploiting vulnerabilities in web applications to insert malicious SQL code into a database query, potentially leading to data theft or manipulation.

Social engineering (phishing)

Distributed denial of service

Back door

IP spoofing

SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Injecting malicious scripts into otherwise trusted websites. These scripts can then run in the user's browser, potentially stealing information or hijacking sessions.

Man-in-the-middle (MITM)

Cross-site scripting (XSS)

Zero day vulnerabilities

Back door

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software flaws unknown to the software vendor and, therefore, for which no patch exists.

Man-in-the-middle (MITM)

Cross-site scripting (XSS)

Zero day vulnerabilities

Back door

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hidden method of bypassing normal authentication or encryption in a computer system, network, or software application, often installed by attackers.

Man-in-the-middle (MITM)

Cross-site scripting (XSS)

Zero day vulnerabilities

Back door

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?