Y8 System security

Y8 System security

5th Grade

10 Qs

quiz-placeholder

Similar activities

Communication & Networking - Differences Between LAN & WAN

Communication & Networking - Differences Between LAN & WAN

2nd - 12th Grade

10 Qs

 Grade 4 - Computer network

Grade 4 - Computer network

4th - 5th Grade

11 Qs

Computers and their parts

Computers and their parts

3rd - 5th Grade

6 Qs

E-safety, Cyber-security

E-safety, Cyber-security

4th - 10th Grade

10 Qs

Avoiding Clickbait

Avoiding Clickbait

5th Grade

10 Qs

Talking Safely Online-Lesson 3

Talking Safely Online-Lesson 3

3rd - 5th Grade

12 Qs

Computer Safety Quiz

Computer Safety Quiz

KG - 5th Grade

15 Qs

Outlook Knowledge

Outlook Knowledge

5th Grade

15 Qs

Y8 System security

Y8 System security

Assessment

Quiz

Computers

5th Grade

Medium

Created by

Mr Bell

Used 17+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A program that installs and runs on a computer without the user’s knowledge.

Hardware that controls a user’s computer without their knowledge.

A faulty piece of software.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a virus?

A program that makes the user feel unwell.

A program that replicates itself and spreads to other computers via attachments.

A program that you can download for free.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spyware?

A program that replicates itself and spreads to other computers via attachments.

Hardware that controls a computer without the user's knowledge.

A program that monitors computer activity in an attempt to steal sensitive information.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be used to remove malware from a computer?

Anti-malware software

A firewall

A filter

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes a passive attack?

Someone attacks a network with malware.

Someone from inside an organisation uses the network to steal information.

Someone monitors data travelling on the network to steal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes an active attack?

Someone attacks a network with malware.

Someone from inside an organisation uses the network to steal information.

Someone monitors data travelling on the network to steal information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes a brute force attack?

A hacker tries to stop people from accessing a network by flooding it with traffic.

Someone tries to get information by cracking password through trial and error.

Someone from inside an organisation tries to steal information.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?