Shell Cyber Threats Quiz

Shell Cyber Threats Quiz

8th Grade

16 Qs

quiz-placeholder

Similar activities

Cyber Security Homework 2

Cyber Security Homework 2

7th - 9th Grade

15 Qs

Networks Recap Quiz

Networks Recap Quiz

8th Grade

19 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Malware Terms

Malware Terms

8th Grade

15 Qs

Cyber Security Interim Homework

Cyber Security Interim Homework

8th Grade

15 Qs

Privacy and security

Privacy and security

7th - 9th Grade

20 Qs

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

7th - 12th Grade

20 Qs

Types of Cyberthreat

Types of Cyberthreat

8th Grade

20 Qs

Shell Cyber Threats Quiz

Shell Cyber Threats Quiz

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Mikey Lear

Used 17+ times

FREE Resource

16 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the word for cyber attacks which use people as a weak point?

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS?

Many computers being infected with malware

Many computers stealing data from another computer

Many computers overwhelming a server

Systematically trying every password until you get the right one

3.

CLASSIFICATION QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Malware

,

(b) Social engineering

Trojan

Blagging

Virus

Ransomeware

Phishing

Shouldering

4.

DROPDOWN QUESTION

1 min • 1 pt

Phishing is a type of cybercrime where attackers try to trick you into giving away ​ (a)   , like passwords or credit card numbers, by pretending to be a ​ (b)   source. They often use ​ (c)   emails, messages, or websites that look real to lure you into clicking ​ (d)   or providing sensitive information.

personal information
money
trustworthy
fake
invisible
links
attachments

5.

MATCH QUESTION

1 min • 1 pt

Match the following

Shows adverts

Name generator attack

Stops viruses entering a network

Firewall

Works out a password

Adware

Disrupts a service

DDoS

Gets personal information

Brute force

6.

DRAG AND DROP QUESTION

1 min • 1 pt

A ​ (a)   acts as a barrier between your computer network and threats from the internet, monitoring incoming and outgoing ​ (b)   to block unauthorised access. It can help defend against Distributed Denial of Service (​ (c)   ) attacks by filtering out ​ (d)   requests from malicious sources, and it can prevent ​ (e)   by blocking harmful data packets that attempt to enter the system

firewall
traffic
DDoS
excessive
viruses
unknown
server

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is information without context, and therefore without meaning?

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?