Lesson 5 - Network Threats

Lesson 5 - Network Threats

9th Grade

13 Qs

quiz-placeholder

Similar activities

Coding Quiz

Coding Quiz

6th - 10th Grade

15 Qs

ABC in python

ABC in python

9th Grade

14 Qs

superhéroes

superhéroes

9th Grade

18 Qs

Electrónica

Electrónica

9th Grade

14 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

CIA Mid-Term Review 1

CIA Mid-Term Review 1

9th - 10th Grade

17 Qs

PythonQuiz2-Selection

PythonQuiz2-Selection

7th - 12th Grade

8 Qs

flowol week 3

flowol week 3

9th - 12th Grade

17 Qs

Lesson 5 - Network Threats

Lesson 5 - Network Threats

Assessment

Quiz

Computers

9th Grade

Medium

Created by

R Ward

Used 66+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Which of the following are examples of Cybercrime?

Planting Viruses

Acquiring/Using personal or confidential data

Disrupting a Website/Service

All of the above

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

What do Cyber Attacks take advantage of?

Human Weakness or Gullibility

Strong Passwords

Virus Protection Software

Technical weaknesses in computers and networks

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Human weakness can make computer systems vulnerable to what?

Social Engineering

Nothing

Phishing

Brute Force Attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is Social Engineering?

Tricking people into meeting you

Disguising your identity

Conning individuals into giving away private information

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is Phishing?

Fishing but on the internet

A sometimes sophisticated way of gaining personal information by pretending to be from a business/bank

Pretending to be a different person

The process of making a stronger password

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What should you look out for from a Phishing attack?

Not a personalised greeting

The sender's address doesn't look right or official enough

Request for personal information like bank details

Sense of Urgency

Spelling and Grammar mistakes

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Brute Force attack?

Gaining confidential information from somebody

Using viruses

Conning people

When a hacker manages to workout a password in order to gain access

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?