Shell Cyber Threats Quiz

Shell Cyber Threats Quiz

8th Grade

16 Qs

quiz-placeholder

Similar activities

Conditions

Conditions

8th - 10th Grade

16 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Ultrasonic Sensor and Parking Assistance Quiz

Ultrasonic Sensor and Parking Assistance Quiz

8th Grade

20 Qs

Website constructs

Website constructs

6th - 8th Grade

11 Qs

Ethical Issues of I.T.

Ethical Issues of I.T.

7th - 8th Grade

11 Qs

ÔN TẬP WHILE DO VÀ FOR TO DO

ÔN TẬP WHILE DO VÀ FOR TO DO

8th Grade

20 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

Year 8 Lists

Year 8 Lists

8th Grade

20 Qs

Shell Cyber Threats Quiz

Shell Cyber Threats Quiz

Assessment

Quiz

Computers

8th Grade

Practice Problem

Easy

Created by

Mikey Lear

Used 17+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the word for cyber attacks which use people as a weak point?

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS?

Many computers being infected with malware

Many computers stealing data from another computer

Many computers overwhelming a server

Systematically trying every password until you get the right one

3.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Malware

,

(b) Social engineering

Trojan

Phishing

Virus

Shouldering

Blagging

Ransomeware

4.

DROPDOWN QUESTION

1 min • 1 pt

Phishing is a type of cybercrime where attackers try to trick you into giving away ​ (a)   , like passwords or credit card numbers, by pretending to be a ​ (b)   source. They often use ​ (c)   emails, messages, or websites that look real to lure you into clicking ​ (d)   or providing sensitive information.

personal information
money
trustworthy
fake
invisible
links
attachments

5.

MATCH QUESTION

1 min • 1 pt

Match the following

Gets personal information

Name generator attack

Works out a password

Brute force

Stops viruses entering a network

DDoS

Shows adverts

Firewall

Disrupts a service

Adware

6.

DRAG AND DROP QUESTION

1 min • 1 pt

A ​ (a)   acts as a barrier between your computer network and threats from the internet, monitoring incoming and outgoing ​ (b)   to block unauthorised access. It can help defend against Distributed Denial of Service (​ (c)   ) attacks by filtering out ​ (d)   requests from malicious sources, and it can prevent ​ (e)   by blocking harmful data packets that attempt to enter the system

firewall
traffic
DDoS
excessive
viruses
unknown
server

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is information without context, and therefore without meaning?

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?