
G10 1.4 L5 MINI
Authored by Kiers McFarlane
Computers
10th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is interception in cybersecurity?
Sending spam emails
Unauthorized access to data during transmission
Downloading files from the internet
Using a strong password
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of interception involves silently listening to network traffic without altering it?
Active interception
Passive interception
Data injection
Phishing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of an active interception attack?
Packet sniffing
Man-in-the-Middle (MITM) attack
Monitoring internet speed
Using antivirus software
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool is commonly used for packet sniffing?
Microsoft Word
Wireshark
Photoshop
Google Chrome
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does an HTTPS stripping attack do?
Removes encryption from a secure connection
Encrypts internet traffic
Blocks website access
Scans for malware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main risk of using public Wi-Fi?
Slow internet speed
High data usage
Interception of sensitive data
Increased battery consumption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do hackers use rogue Wi-Fi hotspots?
To provide free internet
To steal data by tricking users into connecting
To block advertisements
To speed up connections
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?