Network security

Network security

8th - 9th Grade

10 Qs

quiz-placeholder

Similar activities

G6 Folder

G6 Folder

6th - 8th Grade

10 Qs

 Unit 4 Advanced AP CSP

Unit 4 Advanced AP CSP

9th - 12th Grade

10 Qs

Cyber Security

Cyber Security

1st - 10th Grade

10 Qs

Programs and Variables in Code and Play

Programs and Variables in Code and Play

5th - 9th Grade

7 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

Spreadsheets

Spreadsheets

6th - 8th Grade

13 Qs

Copyright & Fair Use scenarios

Copyright & Fair Use scenarios

6th - 8th Grade

8 Qs

Grade-8

Grade-8

8th Grade

10 Qs

Network security

Network security

Assessment

Quiz

Computers

8th - 9th Grade

Practice Problem

Hard

Created by

Peter Hyland

Used 35+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is described as...

"software that is designed to gain access to your computer with malicious intent.software that is designed to gain access to your computer with malicious intent"

Phishing

Malware

Virus

Adware

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is described as...

"a malicious form of self-replicating software. Once on a computer or network, it will replicate itself by maliciously modifying other computer programs and inserting code"

Malware

Phishing

Trojan

Virus

3.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What is described as...

"This is a form of virus, as it is self-replicating. Specifically, it locks a computer, encrypts files, and therefore prevents the user from being able to access the data. The attacker will demand that a ransom be paid before they decrypt the files and unlock the computer."

Adware

Trojan

Ransomware

Worm

4.

FILL IN THE BLANK QUESTION

20 sec • 5 pts

What is described as...

"This is a form of attack that makes multiple attempts to discover something (such as a password)."

5.

FILL IN THE BLANK QUESTION

10 sec • 5 pts

What is the term for somebody watching you type your PIN into a cash machine?

6.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

How many sections are in the Computer Misuse Act (!979)

2

3

4

5

7.

FILL IN THE BLANK QUESTION

20 sec • 5 pts

What is... "a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes. Examples include Phishing and Blagging"

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?