Cyber Security Threats

Cyber Security Threats

12th Grade

14 Qs

quiz-placeholder

Similar activities

Building Laws Quiz 1- PD 1096

Building Laws Quiz 1- PD 1096

KG - Professional Development

15 Qs

Multiviews

Multiviews

9th - 12th Grade

15 Qs

Carpentry: ELP - from the book

Carpentry: ELP - from the book

9th - 12th Grade

10 Qs

Drafting Architecture Lettering

Drafting Architecture Lettering

9th - 12th Grade

15 Qs

Prelim, Prime Cost, Prov Sum and Pro Rata

Prelim, Prime Cost, Prov Sum and Pro Rata

9th Grade - University

10 Qs

Civil Engineering Bridge Construction Quiz

Civil Engineering Bridge Construction Quiz

12th Grade

15 Qs

Properties of Parallelograms

Properties of Parallelograms

10th Grade - University

11 Qs

Natural and built environment

Natural and built environment

11th - 12th Grade

15 Qs

Cyber Security Threats

Cyber Security Threats

Assessment

Quiz

Architecture

12th Grade

Practice Problem

Medium

Created by

Marie Vaux

Used 1K+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Unauthorized access to control over computer network security systems

Security

Hacking

Surfing

Dancing

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one of the following is NOT a security threat?

Worms

Hacking

Anti-Virus

Pharming

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one of the following is NOT a type of CyberSecurity Attack?

Worms

Randsomware

Spyware

Password Management

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Viruses, worms, and trojans are common security threats that are often used in spreading. What is the name for them all?

Malware

Formalware

Scams

The Spreading attackers

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Fake e-mail message appearing to be from a trusted business, social network or other contact Asks for personal information or requests a user to click on a link or download a file to verify personal information Hackers can secretly collect personal information and passwords

Farming

Pharming

Phishing

Fishing

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access

True

False

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe?

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?