iDEA | Cyber Spies & Internet & Web

iDEA | Cyber Spies & Internet & Web

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

ICT final revision

ICT final revision

8th Grade

13 Qs

Cloud Computing

Cloud Computing

7th - 11th Grade

10 Qs

Gestión de riesgos

Gestión de riesgos

1st - 10th Grade

10 Qs

Seguridad informatica

Seguridad informatica

7th Grade

10 Qs

ICT summer revision

ICT summer revision

1st - 8th Grade

13 Qs

POCS-Ch1.3 (Vocab)

POCS-Ch1.3 (Vocab)

6th - 8th Grade

10 Qs

Cybersecurity - L1 Recap

Cybersecurity - L1 Recap

8th Grade

10 Qs

iDEA | Cyber Spies & Internet & Web

iDEA | Cyber Spies & Internet & Web

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

H Malaney

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does DDoS stand for?

Distributed Data of Service
Dynamic Denial of Service
Decentralized Denial of Service
Distributed Denial of Service

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is hacking?

Hacking is the act of repairing computer systems.
Hacking refers to the process of creating software applications.
Hacking is the act of exploiting vulnerabilities in computer systems or networks to gain unauthorized access.
Hacking is a method of improving computer security.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Security Hole/Exploit?

A security hole is a vulnerability that can be exploited to compromise a system's security.
A security hole is a method to improve user access control.
A security hole is a feature that protects against cyber attacks.
A security hole is a type of software that enhances system performance.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the process that involves scrambling data into an unreadable format before sending so unauthorised recipients cannot access it?

Decryption
Compression
Encoding
Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of virus disguises itself as something else within code to avoid detection?

Spyware

Worm

Virus

Trojan Horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a black hat hacker do?

A black hat hacker conducts illegal activities to exploit systems and networks.
A black hat hacker develops software for ethical hacking.
A black hat hacker protects systems from attacks.
A black hat hacker conducts security audits for companies.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do white hat hackers differ to black hat hackers?

Black hat hackers are government agents protecting systems.
White hat hackers are criminals who steal data.
White hat hackers are ethical and work to improve security, while black hat hackers are malicious and exploit vulnerabilities.
White hat hackers create malware to harm users.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?