Lesson 6a Physical Vulnerabilities

Lesson 6a Physical Vulnerabilities

8th Grade

17 Qs

quiz-placeholder

Similar activities

Cybersecurity 101

Cybersecurity 101

6th - 8th Grade

20 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Year 8 Methods of Attack and Hacking

Year 8 Methods of Attack and Hacking

6th - 8th Grade

13 Qs

Digital Security Risk.

Digital Security Risk.

8th Grade

20 Qs

AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

8th - 10th Grade

20 Qs

Unit 7 - Assessing Cybersecurity Risk

Unit 7 - Assessing Cybersecurity Risk

8th Grade

22 Qs

Digital Citizenship and Online Safety

Digital Citizenship and Online Safety

8th Grade

15 Qs

starter 9.3.3

starter 9.3.3

8th Grade

12 Qs

Lesson 6a Physical Vulnerabilities

Lesson 6a Physical Vulnerabilities

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Thomas Reynolds

Used 4+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain two ways malware can affect a computer system.

Slows down the system and steals data

Improves system performance and enhances security

Increases internet speed and blocks ads

Cleans up unnecessary files and boosts memory

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a focus of the Cyber Security unit mentioned?

Security

Prevention

Legislation

Marketing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a UPS do?

Provides backup power during outages

Increases internet speed

Reduces electricity bills

Enhances data storage capacity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the benefits of a UPS to a business?

Protects data during power failures

Increases employee productivity

Reduces hardware costs

Improves software performance

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the essential learning outcome related to physical vulnerabilities?

Explain how physical vulnerabilities may be exploited

Identify physical vulnerabilities

Discuss the consequences of physical vulnerabilities

Create new physical vulnerabilities

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common vulnerability relating to computer devices?

Malware

Theft

Phishing

Hacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of theft related to computer devices?

Installing a virus

Breaking-in to a property and stealing device(s)

Sending spam emails

Creating a fake website

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?