Cyber Security Topics in IGCSE Computer Science

Cyber Security Topics in IGCSE Computer Science

8th Grade

46 Qs

quiz-placeholder

Similar activities

Information Technology Term 1 Revision

Information Technology Term 1 Revision

8th Grade

48 Qs

Malware- online security

Malware- online security

5th - 10th Grade

50 Qs

Online Privacy Exam

Online Privacy Exam

6th - 8th Grade

48 Qs

Year 9 - End of year assessment

Year 9 - End of year assessment

8th Grade

50 Qs

Networks and Security Basics

Networks and Security Basics

8th Grade

44 Qs

unit 1 online world mock exam 1

unit 1 online world mock exam 1

8th Grade

41 Qs

Ист рк 2 1/50

Ист рк 2 1/50

KG - University

50 Qs

Stocks

Stocks

8th Grade

50 Qs

Cyber Security Topics in IGCSE Computer Science

Cyber Security Topics in IGCSE Computer Science

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Shervon Yak

Used 1+ times

FREE Resource

46 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What is a type of malware that replicates itself to spread to other computers?

Evaluate responses using AI:

OFF

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of social engineering attack that involves tricking someone into giving out confidential information is called:

Phishing

Brute Force

Denial of Service

SQL Injection

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Which network security threat involves overwhelming a system with traffic to make it unavailable?

Evaluate responses using AI:

OFF

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a security measure that involves verifying the identity of a user before granting access?

Authentication

Encryption

Firewall

Antivirus

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Which type of malware is designed to demand payment to restore access to data?

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term for a social engineering attack that involves creating a fake website to steal information is called:

Phishing

Vishing

Smishing

Pharming

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security threat that involves unauthorized access to data during transmission is called:

Phishing

Eavesdropping

Spoofing

Denial of Service

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?