Network Security Revision

Network Security Revision

11th Grade

10 Qs

quiz-placeholder

Similar activities

social engineering

social engineering

1st Grade - Professional Development

10 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

1.5.5 - Starter Task/Digital Footprint

1.5.5 - Starter Task/Digital Footprint

11th Grade

11 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Social Engineering - CyberSecurity

Social Engineering - CyberSecurity

9th - 12th Grade

8 Qs

Data Stealing and Malware

Data Stealing and Malware

9th - 11th Grade

10 Qs

J808 LO4.1.3 Social Engineering

J808 LO4.1.3 Social Engineering

10th - 11th Grade

11 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Network Security Revision

Network Security Revision

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Pritpal Mann

Used 17+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Some attacks don't always cause damage or change data. Why might an attacker simply steal personal or sensitive data? Select all that apply

Blackmail and extortion

Backups and archiving

SQL injection

Fraud

Industrial espionage

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do we call sending fake emails to fool people into revealing personal information?

Phishing

Blagging

Shouldering

Pharming

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Computer systems attached to the internet are more vulnerable to attack than systems which are offline. True or false?

True

False

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Phishing emails are often easy to spot. What should you look for? Select all that apply

Poor grammar and spelling

Images and logos are poor quality copies

They are always in the "Spam" or "Junk" folder

"Dear Customer" and no mention of your name

Hyperlinks show a different URL when you hover on them

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Manipulating someone into giving out private or confidential information, e.g. through phishing or pretexting, is what type of attack?

Extrinsic motivation

Social engineering

Human persuasion

Physical coercion

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If a web form input is not validated, what attack is more likely?

Malware

Denial of Service

SQL Injection

Social Engineering

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This attack stops legitimate users from accessing a system, by overloading it with traffic

Website closure

Server soaking

Traffic swamping

Denial of service

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?