Search Header Logo

L3 - Cyber Security

Authored by A Beacham

Computers

8th Grade

Used 2+ times

L3 - Cyber Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is 'L3tM31N' a strong password?

Yes

No

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lily is creating a new account and chooses the password 'Qw3rt9u10)'. Is this a strong password?

Yes

No

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define the term 'Hacking'.

Hacking is the act of gaining unauthorized access to data in a system or computer.

Hacking is the process of creating new software for computers.

Hacking is the legal method of protecting computer systems from viruses.

Hacking is the act of regularly updating your computer's operating system.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a 'DDoS attack'?

A DDoS (Distributed Denial of Service) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.

A DDoS attack is a method of encrypting data for secure communication.

A DDoS attack is a type of firewall used to protect networks from malware.

A DDoS attack is a process of backing up data to prevent loss.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the 'Computer Misuse Act'?

The Computer Misuse Act is a law in the UK designed to protect computer users against attacks and theft of information.

The Computer Misuse Act is a UK law that regulates online shopping.

The Computer Misuse Act is a law about copyright protection for music and movies in the UK.

The Computer Misuse Act is a UK law that governs the use of social media platforms.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A DDoS attack can impact users of online services by:

making the services slow or unavailable

improving the speed of the services

protecting users from malware

increasing the security of the services

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Strategies to reduce the chance of a brute force attack being successful include:

Using strong, complex passwords

Sharing passwords with others

Disabling account lockout policies

Using the same password for all accounts

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?