
Cyber Security
Authored by Alex McCluskey
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following types of computer or system is most vulnerable to network attacks?
A desktop computer connected to a wired LAN
A laptop computer connected to a public Wi-Fi hotspot
A smartphone connected to a cellular network
A tablet computer connected to a Bluetooth speaker
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best practice for setting file permissions or privileges in an organisation?
Granting full access to everyone
Granting read-only access to everyone
Granting access based on the principle of least privilege
Granting access based on the principle of most privilege
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the risk of installing software from an untrustworthy source or downloading illegal copies of software?
The software may contain malware or spyware that can compromise the security of the system or data
The software may not work properly or have bugs that can affect the performance of the system or data
The software may violate the intellectual property rights of the original developer or publisher
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to keep the operating system updated and supported?
To fix any security vulnerabilities or bugs that may be exploited by attackers
To add new features or functionalities that may improve the user experience or productivity
To maintain compatibility with other software or hardware components that may change over time
All of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the main challenges of securing mobile devices?
Mobile devices are more prone to physical theft or loss than desktop computers
Mobile devices rely on OEMs to update the system software, which may be delayed or unavailable
Mobile devices use wireless connections that may be intercepted or hacked by attackers
All of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the most common methods of physical security breach?
Using a USB storage device with malicious code or sensitive data
Breaking into a locked room or cabinet where equipment or data is stored
Collecting passwords and other information by social-engineering methods such as phishing or impersonation
All of the above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some of the security implications of cloud computing and IoT devices?
The data stored in the cloud or transmitted by IoT devices may be accessed by unauthorized parties or compromised by hackers
The cloud service provider or IoT device manufacturer may have access to the data or control over the device, which may pose privacy or ethical issues
The cloud service or IoT device may depend on internet connectivity, which may be unreliable or disrupted by attackers
All of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
website design elements
Quiz
•
12th Grade
10 questions
ICT as Social Change
Quiz
•
12th Grade
15 questions
QUIZZ ACCURATE V5 KELAS XI AKL
Quiz
•
9th - 12th Grade
10 questions
HTML & Google Site Seatwork
Quiz
•
12th Grade
15 questions
1.1 Computer Systems Essential Knowledge
Quiz
•
9th - 12th Grade
10 questions
Lourdes Amaranta Ayala Gracia
Quiz
•
8th Grade - University
13 questions
Instalacion de Equipos #1
Quiz
•
9th Grade - University
12 questions
ICT Computer Basics pt1
Quiz
•
10th - 12th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Factor Quadratic Expressions with Various Coefficients
Quiz
•
9th - 12th Grade
18 questions
Success Strategies
Quiz
•
9th - 12th Grade
10 questions
Valentine's Day Trivia
Quiz
•
9th - 12th Grade