Computer Security

Computer Security

10th Grade

7 Qs

quiz-placeholder

Similar activities

OCR Internet Technologies

OCR Internet Technologies

10th - 11th Grade

12 Qs

Administrasi Infrastruktur Jaringan

Administrasi Infrastruktur Jaringan

1st - 10th Grade

10 Qs

Hari 3 - Kuis Coding & Perkenalan AI - Fitri Yanti

Hari 3 - Kuis Coding & Perkenalan AI - Fitri Yanti

1st - 12th Grade

12 Qs

X UH 3 TIK

X UH 3 TIK

10th Grade

10 Qs

Câu lệnh vào ra trong python

Câu lệnh vào ra trong python

10th Grade

10 Qs

Types of Mass Media

Types of Mass Media

10th Grade - Professional Development

11 Qs

Quiz 8 (01.09.2021)

Quiz 8 (01.09.2021)

1st - 12th Grade

10 Qs

Sistem Optic

Sistem Optic

10th Grade

10 Qs

Computer Security

Computer Security

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

Created by

Jon Rogers

Used 35+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The number 1 danger to networks in the UK in 2024 is...

The Russians

The Chinese

Human error

Viruses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

An exploit where the vendor is unaware of the flaw and so has not made a patch available.

Zero day attack

Data interception

SQL Injection

Brute force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Trying every possible combination e.g. letters & numbers in a password

Zero day attack

Data interception

SQL Injection

Brute force

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Also called wiretapping - when packets on a network are captured with a compromised router or other specialised hardware

Zero day attack

Data interception

SQL Injection

Brute force

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

A network or device is overwhelmed by a massive amount of data traffic being directed at it

Zero day attack

Data interception

SQL Injection

Denial of Service

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Data entry forms are filled in with code that allows a hacker to access data from the database directly

Zero day attack

Data interception

SQL Injection

Denial of Service

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which of the following tell-tale signs of a phishing email can be seen in this image (click to zoom!)

Poor spelling or grammar

Inauthentic email address

Excessive urgency

Links to click

Impersonal greeting

Discover more resources for Computers