Hacking - Lesson 2

Hacking - Lesson 2

9th Grade

10 Qs

quiz-placeholder

Similar activities

Personal Data

Personal Data

9th - 11th Grade

15 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Python Selection

Python Selection

8th - 9th Grade

10 Qs

Y8 Recap

Y8 Recap

7th - 9th Grade

10 Qs

Cyber Security Measures Yr8

Cyber Security Measures Yr8

7th - 9th Grade

10 Qs

Quantum Computing

Quantum Computing

8th Grade - University

10 Qs

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

Code.org Unit 3 Review

Code.org Unit 3 Review

9th - 12th Grade

8 Qs

Hacking - Lesson 2

Hacking - Lesson 2

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Greg Sloan

Used 297+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When we try and take something we rely on people and the object having ....

Interdisciplinary

Interstate

Internal Reaction

Interactions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Interactions are split into two groups

Trust and Allows

Trust and Accesses

Tokens and Accesses

Tokens and Allows

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of a trust interaction is

When the interactions happen between people who are do not know each other

When the you get somebody else to do the work for you

When the interactions happen between people who are familiar with each other

When the interactions happen between people who are from the same family

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of an access interaction is

When the interactions happen between people or systems who do not know each other

When the you get somebody else to do the work for you

When the interactions happen between people who are familiar with each other

When the interaction is from a different country

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The correct definition of 'Attack Surface' is..

how big a computer network is

How likely it is to be attacked

The amount of different ways it is safe from hackers

All of the ways in which an unauthorised person can enter or steal data from an environment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a low 'visibility' is good for a company because?

It means hackers don't know what information you have

It means you don't make any money

It means hackers will not be able to hack you

It is free

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In terms of cyber security if your company has 'high porosity' it means ...

Your company is not worth much

You can resist hackers well

You have many holes in your cyber defences

You have low visibility

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?