Search Header Logo

0984 U5T5 Cybersecurity threats

Authored by R Mears

Computers

10th Grade

Used 1+ times

0984 U5T5 Cybersecurity threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Isabella is trying to protect her online accounts. Which of the following is a type of cyber security threat that involves attempting to gain unauthorised access to a system by systematically trying all possible passwords?

Data interception

Brute-force attack

Pharming

Phishing

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

During a cybersecurity class, Elsie and Muhammad learned about different types of cyber attacks. What is the primary aim of a Distributed Denial of Service (DDoS) attack?

To steal sensitive data

To disrupt the normal traffic of a targeted server, service, or network

To install malware on a system

To intercept communications

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

During a computer science class, Lily asked, 'Which type of malware is specifically designed to spread from one computer to another?'

Virus

Spyware

Adware

Worm

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Neha received an email that appeared to be from her bank, asking her to verify her account information. This is an example of:

Gaining unauthorised access to a system by trying all possible passwords

Disrupting the normal traffic of a targeted server

Tricking individuals into providing sensitive information

Redirecting users to fraudulent websites

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Grace and Eesha are discussing different types of malware in their cybersecurity class. Which of the following is NOT considered a type of malware?

Virus

Worm

Trojan horse

Data interception

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

During a cybersecurity class, Sophia asked, 'Which of the following is NOT considered malware?'

Virus

Worm

Trojan horse

Firewall

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Alexander wants to protect his computer from harmful software. Which of the following is a method he should use?

Installing anti-malware

Ignoring software updates

Disabling firewalls

Using weak passwords

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?