Cybersecurity Test

Cybersecurity Test

8th Grade

72 Qs

quiz-placeholder

Similar activities

Ôn Tập Tin Học 8

Ôn Tập Tin Học 8

8th Grade

70 Qs

Tipus circuits 2n ESO

Tipus circuits 2n ESO

8th Grade

70 Qs

Multimedia Tech Exam Review

Multimedia Tech Exam Review

6th - 8th Grade

75 Qs

8 анги

8 анги

8th Grade

75 Qs

Primary 6 Term 2 Computing Assessment

Primary 6 Term 2 Computing Assessment

6th Grade - University

74 Qs

Examen de Tecnología II

Examen de Tecnología II

8th Grade

77 Qs

Công Nghệ 8 – Thư viện câu hỏi kiểm tra cuối kỳ I

Công Nghệ 8 – Thư viện câu hỏi kiểm tra cuối kỳ I

8th Grade

76 Qs

Cybersecurity Test

Cybersecurity Test

Assessment

Quiz

Instructional Technology

8th Grade

Practice Problem

Hard

Created by

Melinda Lewis

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

72 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An acronym that stands for distributed denial of service – a form of cyber attack.

DDoS

Domain

Ransomware

Spoofing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A grouping of computer systems, potentially anywhere in the world, that has been infected by a malicious piece of software. This software allows them to be networked together by the hacker (or bot-herder).

Firewall

Breach

Botnet

Domain

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A tool that allows the user to remain anonymous while using the internet.

Malware

Virtual Private Network

Spoofing

https:// versus http://

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ensuring all important data is stored in a secure, offline location to protect it from being lost, if a computer is hacked. It’s important to routinely copy files to a USB flash drive.

Backup

Virus

IP Address

https:// versus http://

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The hacker will send a command through this server, which then relays it to all compromised computers in the network.

Honeypot

Vulnerability

Worm

Command-and-control server

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technology that allows us to access our files through the internet from anywhere in the world.

Cloud

Virtual Private Network

Malware

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.

Malware

Breach

Patch or Update

Command-and-control server

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?