Hacking - Lesson 2

Hacking - Lesson 2

9th Grade

10 Qs

quiz-placeholder

Similar activities

Digital Footprint

Digital Footprint

9th Grade

10 Qs

Biometrics-IGCSE ICT

Biometrics-IGCSE ICT

9th - 11th Grade

10 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Minecraft

Minecraft

KG - Professional Development

13 Qs

Studio - U3 - LO2-2.3 Attacker Motivations

Studio - U3 - LO2-2.3 Attacker Motivations

9th Grade

10 Qs

IT Policies

IT Policies

9th - 11th Grade

13 Qs

FBI warns of hackers hijacking online Zoom

FBI warns of hackers hijacking online Zoom

9th Grade

10 Qs

DNS

DNS

9th Grade

7 Qs

Hacking - Lesson 2

Hacking - Lesson 2

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Greg Sloan

Used 297+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When we try and take something we rely on people and the object having ....

Interdisciplinary

Interstate

Internal Reaction

Interactions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Interactions are split into two groups

Trust and Allows

Trust and Accesses

Tokens and Accesses

Tokens and Allows

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of a trust interaction is

When the interactions happen between people who are do not know each other

When the you get somebody else to do the work for you

When the interactions happen between people who are familiar with each other

When the interactions happen between people who are from the same family

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of an access interaction is

When the interactions happen between people or systems who do not know each other

When the you get somebody else to do the work for you

When the interactions happen between people who are familiar with each other

When the interaction is from a different country

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The correct definition of 'Attack Surface' is..

how big a computer network is

How likely it is to be attacked

The amount of different ways it is safe from hackers

All of the ways in which an unauthorised person can enter or steal data from an environment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a low 'visibility' is good for a company because?

It means hackers don't know what information you have

It means you don't make any money

It means hackers will not be able to hack you

It is free

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In terms of cyber security if your company has 'high porosity' it means ...

Your company is not worth much

You can resist hackers well

You have many holes in your cyber defences

You have low visibility

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?