Y8 System security

Y8 System security

5th Grade

10 Qs

quiz-placeholder

Similar activities

Cyber Security Challenge

Cyber Security Challenge

1st - 5th Grade

10 Qs

Y9 System security

Y9 System security

5th Grade

10 Qs

Information Privacy Third Grade

Information Privacy Third Grade

2nd - 5th Grade

10 Qs

Information Privacy

Information Privacy

1st - 12th Grade

10 Qs

Computer Viruses and You!

Computer Viruses and You!

5th Grade

10 Qs

Cybersafety

Cybersafety

2nd - 8th Grade

15 Qs

Information Privacy

Information Privacy

3rd - 5th Grade

6 Qs

Y8 System security

Y8 System security

Assessment

Quiz

Computers

5th Grade

Medium

Created by

Mr Bell

Used 17+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A program that installs and runs on a computer without the user’s knowledge.

Hardware that controls a user’s computer without their knowledge.

A faulty piece of software.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a virus?

A program that makes the user feel unwell.

A program that replicates itself and spreads to other computers via attachments.

A program that you can download for free.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spyware?

A program that replicates itself and spreads to other computers via attachments.

Hardware that controls a computer without the user's knowledge.

A program that monitors computer activity in an attempt to steal sensitive information.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be used to remove malware from a computer?

Anti-malware software

A firewall

A filter

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes a passive attack?

Someone attacks a network with malware.

Someone from inside an organisation uses the network to steal information.

Someone monitors data travelling on the network to steal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes an active attack?

Someone attacks a network with malware.

Someone from inside an organisation uses the network to steal information.

Someone monitors data travelling on the network to steal information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes a brute force attack?

A hacker tries to stop people from accessing a network by flooding it with traffic.

Someone tries to get information by cracking password through trial and error.

Someone from inside an organisation tries to steal information.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?