
0984 U5T5 Cybersecurity threats
Authored by R Mears
Computers
10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Isabella is trying to protect her online accounts. Which of the following is a type of cyber security threat that involves attempting to gain unauthorised access to a system by systematically trying all possible passwords?
Data interception
Brute-force attack
Pharming
Phishing
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
During a cybersecurity class, Elsie and Muhammad learned about different types of cyber attacks. What is the primary aim of a Distributed Denial of Service (DDoS) attack?
To steal sensitive data
To disrupt the normal traffic of a targeted server, service, or network
To install malware on a system
To intercept communications
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
During a computer science class, Lily asked, 'Which type of malware is specifically designed to spread from one computer to another?'
Virus
Spyware
Adware
Worm
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Neha received an email that appeared to be from her bank, asking her to verify her account information. This is an example of:
Gaining unauthorised access to a system by trying all possible passwords
Disrupting the normal traffic of a targeted server
Tricking individuals into providing sensitive information
Redirecting users to fraudulent websites
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Grace and Eesha are discussing different types of malware in their cybersecurity class. Which of the following is NOT considered a type of malware?
Virus
Worm
Trojan horse
Data interception
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
During a cybersecurity class, Sophia asked, 'Which of the following is NOT considered malware?'
Virus
Worm
Trojan horse
Firewall
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Alexander wants to protect his computer from harmful software. Which of the following is a method he should use?
Installing anti-malware
Ignoring software updates
Disabling firewalls
Using weak passwords
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
55 questions
ИТОГОВЫЙ ТЕСТ Информатика 10 класс
Quiz
•
10th Grade
60 questions
Programación
Quiz
•
KG - Professional Dev...
62 questions
Network Security - Practice Test #1
Quiz
•
10th Grade - University
58 questions
Complete BTEC DIT Quiz (All Questions So Far)
Quiz
•
10th Grade
58 questions
Building Materials
Quiz
•
10th - 12th Grade
56 questions
CompTia 1001 Exam Review
Quiz
•
10th Grade - University
63 questions
IST Final Exam Review Tindall
Quiz
•
9th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade