
Staying safe online 3: hacking and DoS attacks
Authored by Nick Allen
Computers
7th Grade
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is hacking?
a collection of zombie devices
a computer system on a network
an attack on a server by so many fake requests that the server can't deal with them
attempting to access data held on a device without permission
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a hotspot?
a place where you can connect a device to a public Wi-Fi network
a business or organisation that is is undergoing a denial of service attack
a place where hackers ends up when he, she or they have been caught
software that a hacker installs on your device to monitor what you do
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a zombie device?
a device that was broken but has been repaired
a device that can connect to a public Wi-Fi network
a device that a hacker can control
a computer system on a network
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a server?
a place where you can connect a device to a public Wi-Fi network
a computer system on a network that provides a function such as hosting websites, files or online games
someone who brings you a drink and a sandwich while you're at your computer
software that monitors what you do on a device and sends personal data to the hacker
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a botnet?
a collection of zombie devices under the control of a hacker
when a server on a network is sent too many fake requests for it to deal with them effectively
a place where you can connect a device to a public Wi-Fi network
software that monitors what you do on a device and sends personal data to the hacker
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a denial of service (DoS) attack?
when a shopkeeper refuses to serve someone
an attempt to access data held on a device without permission
when a server on a network is sent too many fake requests for it to deal with effectively
when a hacker gathers personal data using spyware
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following devices could a hacker take control of and become zombie devices?
smart refrigerator
smart phone
smart washing machine
laptop
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?