Riviosn_internet threats & computer system

Riviosn_internet threats & computer system

9th - 12th Grade

13 Qs

quiz-placeholder

Similar activities

OCR GCSE Computer Science 1.2 Sound

OCR GCSE Computer Science 1.2 Sound

10th - 11th Grade

13 Qs

Password Hacking Techniques

Password Hacking Techniques

9th Grade - University

14 Qs

A words - GCSE Computer Science

A words - GCSE Computer Science

1st - 10th Grade

13 Qs

GCSE AQA CS - 06 Cyber Security

GCSE AQA CS - 06 Cyber Security

10th - 11th Grade

18 Qs

IGCSE ICT Application

IGCSE ICT Application

7th - 9th Grade

11 Qs

Data representation - Sound

Data representation - Sound

9th - 11th Grade

12 Qs

Bảo mật mạng

Bảo mật mạng

11th Grade

10 Qs

Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

10th Grade

15 Qs

Riviosn_internet threats & computer system

Riviosn_internet threats & computer system

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Amna D

Used 98+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Mona is the data security manager for a governmental organisation. One her desired goals of security is to ensure that the data can be accessed only by those who are allowed to see it. This is known as data ____________.

confidentiality

integrity

availability

publicity

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Salem opened an email attachment, but immediately after opening it, his computer froze, and all his files were encrypted. A few minutes later, a message appeared on the screen demanding that he pay 20,000 AED to remove the encryption!

What is the name of this cyberattack

Trojan horse

Scareware

Denial of Service (DOS)

Ransomware

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Lamia is working as a web developer in a company. The server of her company’s website started receiving too many requests that it could not handle. This led to service interruption, and the website is not working any more.

This type of attack is known as a ______________ attack.

brute-force

rootkit

Denial of Service (DOS)

backdoor

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which one of the below passwords is the most secure against password cracking attacks?

Password

P@55Word12!

PassWord12

WoRd5pas$_x_&&

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which one of the below passwords is the least usable for Amna for the user to enter on a mobile phone?

Password

MyPasswordConsistsOf50CharactersAnd8CapitalLetters

P@ssword123

Amna@2008

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Ahmad is trying to set a new password for his online bank account. He knows that the more complex the password is, it will be _________ secure against a password cracking attack, but that it will be the _____________ usable.

less, least

less, most

more, least

more, most

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

Look at the image concerning the levels of abstraction of how a computer works. Level C is known as the __________ domain of abstraction.

software

digital

analogue

structure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?