Computer Security

Computer Security

10th Grade

7 Qs

quiz-placeholder

Similar activities

Data Security

Data Security

5th - 10th Grade

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Network Security

Network Security

10th Grade

11 Qs

Internet Security

Internet Security

3rd - 10th Grade

10 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

SQL

SQL

10th - 12th Grade

11 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Computer Security

Computer Security

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Jon Rogers

Used 35+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The number 1 danger to networks in the UK in 2024 is...

The Russians

The Chinese

Human error

Viruses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

An exploit where the vendor is unaware of the flaw and so has not made a patch available.

Zero day attack

Data interception

SQL Injection

Brute force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Trying every possible combination e.g. letters & numbers in a password

Zero day attack

Data interception

SQL Injection

Brute force

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Also called wiretapping - when packets on a network are captured with a compromised router or other specialised hardware

Zero day attack

Data interception

SQL Injection

Brute force

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

A network or device is overwhelmed by a massive amount of data traffic being directed at it

Zero day attack

Data interception

SQL Injection

Denial of Service

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct name for this type of attack:

Data entry forms are filled in with code that allows a hacker to access data from the database directly

Zero day attack

Data interception

SQL Injection

Denial of Service

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which of the following tell-tale signs of a phishing email can be seen in this image (click to zoom!)

Poor spelling or grammar

Inauthentic email address

Excessive urgency

Links to click

Impersonal greeting