Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

10th Grade

15 Qs

quiz-placeholder

Similar activities

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

12 Qs

1.6 Threats to networks 1: People as the weak point

1.6 Threats to networks 1: People as the weak point

10th Grade

12 Qs

GCSE AQA CS - 06 Cyber Security

GCSE AQA CS - 06 Cyber Security

10th - 11th Grade

18 Qs

J808 LO4.1.4 Hacking, 5 DDOS, 6 Pharming

J808 LO4.1.4 Hacking, 5 DDOS, 6 Pharming

10th - 11th Grade

15 Qs

(L2) 1.4 Network Security

(L2) 1.4 Network Security

10th Grade

19 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

J808 4.1 Types of threats

J808 4.1 Types of threats

9th - 11th Grade

20 Qs

Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Paul Greenwood

Used 142+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the strongest password

password

Password

Password1

Pa33w0rd!

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What one is a type of verification?

Phishing

Trojan Horse

CAPTCHA

VERY

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

............... is a main, reliable method of keeping your data secure – this scrambles data so anyone intercepting it cannot interpret it

Verification

Authentication

Phishing

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unauthorized access to control over computer network security systems

Security

Hacking

Surfing

Dancing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a security threat?

Worms

Hacking

Anti-Virus

Pharming

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the name given to the cyber-attack where the perpetrator seeks to make a machine unavailable to its intended users by temporarily disrupting its services, typically accomplished by flooding the targeted machine in an attempt to overload it?

DDos

Pharming

Trojan Horse

Flooder

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a type of CyberSecurity Attack?

Worms

Randsomware

Spyware

Password Management

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?