
L3 - Cyber Security
Authored by A Beacham
Computers
8th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Is 'L3tM31N' a strong password?
Yes
No
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lily is creating a new account and chooses the password 'Qw3rt9u10)'. Is this a strong password?
Yes
No
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Define the term 'Hacking'.
Hacking is the act of gaining unauthorized access to data in a system or computer.
Hacking is the process of creating new software for computers.
Hacking is the legal method of protecting computer systems from viruses.
Hacking is the act of regularly updating your computer's operating system.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a 'DDoS attack'?
A DDoS (Distributed Denial of Service) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
A DDoS attack is a method of encrypting data for secure communication.
A DDoS attack is a type of firewall used to protect networks from malware.
A DDoS attack is a process of backing up data to prevent loss.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the 'Computer Misuse Act'?
The Computer Misuse Act is a law in the UK designed to protect computer users against attacks and theft of information.
The Computer Misuse Act is a UK law that regulates online shopping.
The Computer Misuse Act is a law about copyright protection for music and movies in the UK.
The Computer Misuse Act is a UK law that governs the use of social media platforms.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A DDoS attack can impact users of online services by:
making the services slow or unavailable
improving the speed of the services
protecting users from malware
increasing the security of the services
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Strategies to reduce the chance of a brute force attack being successful include:
Using strong, complex passwords
Sharing passwords with others
Disabling account lockout policies
Using the same password for all accounts
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Computers Check for Understanding
Quiz
•
8th - 12th Grade
19 questions
Computer Networks - Year 7
Quiz
•
7th - 8th Grade
10 questions
Coding 300 Coding Basics
Quiz
•
7th - 8th Grade
15 questions
Code.org Express Course Quiz 2
Quiz
•
6th - 8th Grade
16 questions
Programming and Logic Lesson 2
Quiz
•
6th - 8th Grade
18 questions
PC Component Identification
Quiz
•
6th - 12th Grade
12 questions
Identity Theft
Quiz
•
8th - 12th Grade
17 questions
Plotting Shapes on Code.Org
Quiz
•
5th - 8th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade