
Hacking & Phishing
Authored by O. Okuwa
Computers
2nd - 8th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An example of social engineering
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sending requests to a system using hijacked machines is called
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Uses a number of computers over a network of infected machines which send requests to a website which would bring it offline
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What features might give away a phishing email?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software that performs a ‘barrier’ between a potential attacker and the computer system
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user gaining access to a system or intercepting user data without permission would be breaching which law?
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which legislation governs the act of hacking? (1-4)
The Freedom of Information Act
The Data Protection Act
Creative Commons License
The Computer Misuse Act
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?