1.2.1 Cybersecurity Firewalls and Malware

1.2.1 Cybersecurity Firewalls and Malware

9th - 12th Grade

23 Qs

quiz-placeholder

Similar activities

Cyber security

Cyber security

10th - 11th Grade

19 Qs

Computer Threats Quiz

Computer Threats Quiz

10th Grade

20 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

2.3 Network Types

2.3 Network Types

12th Grade

25 Qs

Networking

Networking

11th - 12th Grade

20 Qs

Malware

Malware

9th - 12th Grade

19 Qs

Networks & Topologies (OCR GCSE)

Networks & Topologies (OCR GCSE)

8th - 10th Grade

21 Qs

Viruses and Malware

Viruses and Malware

7th - 9th Grade

20 Qs

1.2.1 Cybersecurity Firewalls and Malware

1.2.1 Cybersecurity Firewalls and Malware

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Robin Robertson

Used 29+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The arrangement of the various elements (computers, routers, switches, etc) of a network.

services

LAN

WAN

network topology

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small local area network of computers and devices.

LAN

WAN

network topology

short message service (SMS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Service can have two meanings in computer terminology:

a) A service can be a specific application or function such as email, chat, etc.

b) A service can refer to a specific part of an application, such as transmitting the data of a web page

network topology

LAN

services

short message service (SMS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cybersecurity terms, a vulnerability is a weakness in a system that allows an attacker to gain unauthorized access.

WAN

vulnerabilities

worm

backdoor

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that is spread by people, specifically user actions, usually through emails, websites, and chats. A virus infects your computer, causing a wide variety of problems.

backdoor

services

worm

virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Similar to a virus except that a worm does not need a human to spread, rather it can replicate on its own to infect other computers.

virus

worm

backdoor

spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that bypasses the normal, secure, or restricted access.

worm

backdoor

trojan horse

spyware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?