Term 3: Checkpoint Revision

Term 3: Checkpoint Revision

12th Grade

21 Qs

quiz-placeholder

Similar activities

Latihan Bab 4 Jaringan Komputer dan Internet

Latihan Bab 4 Jaringan Komputer dan Internet

12th Grade - University

20 Qs

Computers

Computers

12th Grade

22 Qs

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

8th Grade - Professional Development

21 Qs

Virus informáticos

Virus informáticos

12th Grade

20 Qs

Manfaat kemampuan TIK dan INformatika

Manfaat kemampuan TIK dan INformatika

10th - 12th Grade

20 Qs

CyberSecurity - Controls and Responses (Risk, Adversity & Trust)

CyberSecurity - Controls and Responses (Risk, Adversity & Trust)

9th - 12th Grade

23 Qs

Identifying Security Threats

Identifying Security Threats

9th - 12th Grade

21 Qs

11 AIT - hardware and UIs

11 AIT - hardware and UIs

10th - 12th Grade

21 Qs

Term 3: Checkpoint Revision

Term 3: Checkpoint Revision

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Nasra Alshamsi

Used 4+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

______________ practice of protecting systems, networks, and programs from digital attacks.

Cyber attack

Malicious software

Cyber Security

Cyber Criminal

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

______________ harmful and purposeful attempt by an individual or organization to enter another person's or organization’s information system.

Cyber Security

Cyber Attack

Cyber Safety

Cyber Ethics

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

_____________ hackers who are legally permitted to break into certain computer systems to find flaws.

Amateurs

Black hat hacker

Malicious software

Ethical hacking

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

_____________ is an intrusive software that is designed to damage and destroy computers and computer systems.

Malicious software

Cyber attack

Ethical hacking

Script Kiddie

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

____________ is a kind of cyberattack that involves psychological manipulation technique that exploits human error to access confidential information.

Malicious software

Amateurs

Social engineering

Cyber Safety

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

____________ is a common social engineering attack. The attackers contact a target through email, phone, or text message to click a link.

Cyber Security

Phishing

Cyber attack

Malicious software

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

___________ safe and responsible use of information and communication technologies.

Malicious software

Cyber Safety

Amateurs

Ethical hacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?