Shell Cyber Threats Quiz

Shell Cyber Threats Quiz

8th Grade

16 Qs

quiz-placeholder

Similar activities

Privacy and security

Privacy and security

7th - 9th Grade

20 Qs

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

7th - 12th Grade

20 Qs

Cyber Security Homework 2

Cyber Security Homework 2

7th - 9th Grade

15 Qs

Networks Recap Quiz

Networks Recap Quiz

8th Grade

19 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Social Engineering Pt1

Social Engineering Pt1

8th Grade

12 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Shell Cyber Threats Quiz

Shell Cyber Threats Quiz

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Mikey Lear

Used 17+ times

FREE Resource

16 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the word for cyber attacks which use people as a weak point?

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS?

Many computers being infected with malware

Many computers stealing data from another computer

Many computers overwhelming a server

Systematically trying every password until you get the right one

3.

CLASSIFICATION QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Malware

,

(b) Social engineering

Virus

Shouldering

Phishing

Trojan

Blagging

Ransomeware

4.

DROPDOWN QUESTION

1 min • 1 pt

Phishing is a type of cybercrime where attackers try to trick you into giving away ​ (a)   , like passwords or credit card numbers, by pretending to be a ​ (b)   source. They often use ​ (c)   emails, messages, or websites that look real to lure you into clicking ​ (d)   or providing sensitive information.

personal information
money
trustworthy
fake
invisible
links
attachments

5.

MATCH QUESTION

1 min • 1 pt

Match the following

Shows adverts

Firewall

Gets personal information

Name generator attack

Works out a password

DDoS

Disrupts a service

Adware

Stops viruses entering a network

Brute force

6.

DRAG AND DROP QUESTION

1 min • 1 pt

A ​ (a)   acts as a barrier between your computer network and threats from the internet, monitoring incoming and outgoing ​ (b)   to block unauthorised access. It can help defend against Distributed Denial of Service (​ (c)   ) attacks by filtering out ​ (d)   requests from malicious sources, and it can prevent ​ (e)   by blocking harmful data packets that attempt to enter the system

firewall
traffic
DDoS
excessive
viruses
unknown
server

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is information without context, and therefore without meaning?

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?