
Cyber Security 1
Authored by Raghad Ibhais
Education
12th Grade - University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
•Cyber security is:
•Is a process to protect individuals, organizations, and governments from digital attacks
•are individuals or groups of individuals who use technology to commit destructive, illegal activities
•The activities performed on digital systems or networks with the intention to disable computers and steal sensitive data.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
•Vulnerability is:
•is a weakness or fault in a system or protection mechanism that opens it to attack or damage
• is a successful cyber attack that can come from within an organisation by trusted users or from remote locations by unknown parties.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
•Cybercriminals are:
•individuals or groups of individuals who use technology to commit destructive, illegal activities.
•The activities performed on digital systems or networks with the intention to disable computers and steal sensitive data
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
•Cybercrime is:
• a successful cyber attack that can come from within an organisation by trusted users or from remote locations by unknown parties.
•Any criminal activity that involves a computer, networked device or a network
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
•Cyber attacks are:
•a successful cyber attack that can come from within an organisation by trusted users or from remote locations by unknown parties.
•a weakness or fault in a system or protection mechanism that opens it to attack or damage
•The activities performed on digital systems or networks with the intention to disable computers and steal sensitive data.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Types of hackers are:
White hat hackers
Gray hat hackers
Black hat hackers
All of the above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The type of cyber attack that requires the device IP is:
Phishing Attack
Man In the Middle Attack
Malware Attack
Password Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?