Hacking - Lesson 2

Hacking - Lesson 2

9th Grade

10 Qs

quiz-placeholder

Similar activities

Q2 WEEK 3 PRACTICE QUIZ #2

Q2 WEEK 3 PRACTICE QUIZ #2

9th Grade

12 Qs

Computer Lab Rules

Computer Lab Rules

9th - 12th Grade

13 Qs

Software and Computer Care Quiz

Software and Computer Care Quiz

9th Grade

13 Qs

Computer System

Computer System

8th - 9th Grade

10 Qs

Intro to Robotics

Intro to Robotics

9th Grade

14 Qs

Coding Quiz

Coding Quiz

6th - 10th Grade

15 Qs

IP-адрес безопасности

IP-адрес безопасности

8th Grade - Professional Development

15 Qs

IT - TYPING TUTOR

IT - TYPING TUTOR

9th Grade

10 Qs

Hacking - Lesson 2

Hacking - Lesson 2

Assessment

Quiz

Computers

9th Grade

Practice Problem

Hard

Created by

Greg Sloan

Used 300+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When we try and take something we rely on people and the object having ....

Interdisciplinary

Interstate

Internal Reaction

Interactions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Interactions are split into two groups

Trust and Allows

Trust and Accesses

Tokens and Accesses

Tokens and Allows

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of a trust interaction is

When the interactions happen between people who are do not know each other

When the you get somebody else to do the work for you

When the interactions happen between people who are familiar with each other

When the interactions happen between people who are from the same family

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of an access interaction is

When the interactions happen between people or systems who do not know each other

When the you get somebody else to do the work for you

When the interactions happen between people who are familiar with each other

When the interaction is from a different country

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The correct definition of 'Attack Surface' is..

how big a computer network is

How likely it is to be attacked

The amount of different ways it is safe from hackers

All of the ways in which an unauthorised person can enter or steal data from an environment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a low 'visibility' is good for a company because?

It means hackers don't know what information you have

It means you don't make any money

It means hackers will not be able to hack you

It is free

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In terms of cyber security if your company has 'high porosity' it means ...

Your company is not worth much

You can resist hackers well

You have many holes in your cyber defences

You have low visibility

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?