0984 U5T5 Cybersecurity threats

0984 U5T5 Cybersecurity threats

10th Grade

60 Qs

quiz-placeholder

Similar activities

Cyber Security Quiz

Cyber Security Quiz

10th Grade

55 Qs

CS: Python Unit 1 Review

CS: Python Unit 1 Review

9th - 12th Grade

57 Qs

Career Prep Final

Career Prep Final

9th - 12th Grade

58 Qs

Whole Course Revision slides

Whole Course Revision slides

10th Grade

62 Qs

Syed: Chapter 4.1: Software

Syed: Chapter 4.1: Software

9th - 12th Grade

60 Qs

IT Fundamentals 1

IT Fundamentals 1

9th Grade - University

63 Qs

Year 11 - CS - Blended Learning 15 - PP, SE, PC

Year 11 - CS - Blended Learning 15 - PP, SE, PC

10th Grade

65 Qs

0984 U5T5 Cybersecurity threats

0984 U5T5 Cybersecurity threats

Assessment

Quiz

Computers

10th Grade

Medium

Created by

R Mears

Used 1+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Isabella is trying to protect her online accounts. Which of the following is a type of cyber security threat that involves attempting to gain unauthorised access to a system by systematically trying all possible passwords?

Data interception

Brute-force attack

Pharming

Phishing

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

During a cybersecurity class, Elsie and Muhammad learned about different types of cyber attacks. What is the primary aim of a Distributed Denial of Service (DDoS) attack?

To steal sensitive data

To disrupt the normal traffic of a targeted server, service, or network

To install malware on a system

To intercept communications

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

During a computer science class, Lily asked, 'Which type of malware is specifically designed to spread from one computer to another?'

Virus

Spyware

Adware

Worm

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Neha received an email that appeared to be from her bank, asking her to verify her account information. This is an example of:

Gaining unauthorised access to a system by trying all possible passwords

Disrupting the normal traffic of a targeted server

Tricking individuals into providing sensitive information

Redirecting users to fraudulent websites

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Grace and Eesha are discussing different types of malware in their cybersecurity class. Which of the following is NOT considered a type of malware?

Virus

Worm

Trojan horse

Data interception

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

During a cybersecurity class, Sophia asked, 'Which of the following is NOT considered malware?'

Virus

Worm

Trojan horse

Firewall

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Alexander wants to protect his computer from harmful software. Which of the following is a method he should use?

Installing anti-malware

Ignoring software updates

Disabling firewalls

Using weak passwords

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?