Block Chain and Cyber Security

Block Chain and Cyber Security

7th Grade

10 Qs

quiz-placeholder

Similar activities

hardware and software(g3)

hardware and software(g3)

2nd - 10th Grade

10 Qs

JSPS Competition Hackathon - Scratch Language - Grade 1

JSPS Competition Hackathon - Scratch Language - Grade 1

2nd Grade - University

10 Qs

CE4 - Health and Green IT

CE4 - Health and Green IT

7th - 11th Grade

12 Qs

Robotica 2018

Robotica 2018

5th - 9th Grade

11 Qs

EVOLUTION OF COMPUTERS

EVOLUTION OF COMPUTERS

3rd - 8th Grade

10 Qs

CPF 1 - 3

CPF 1 - 3

6th - 8th Grade

15 Qs

Computer Education 7

Computer Education 7

7th Grade

11 Qs

Spacing & Other Questions

Spacing & Other Questions

6th - 7th Grade

10 Qs

Block Chain and Cyber Security

Block Chain and Cyber Security

Assessment

Quiz

Computers

7th Grade

Medium

Created by

nashibe joyce

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is decentralized ledger technology and how does it relate to block chain?

Blockchain is a specific type of decentralized ledger technology that uses blocks of data linked together in a chain.

Decentralized ledger technology has no relation to blockchain

Blockchain is a type of centralized ledger technology

Decentralized ledger technology is a type of centralized database system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain what a DDoS attack is and how it can impact a network.

A DDoS attack has no impact on a network

A DDoS attack can improve network performance

A DDoS attack only affects individual devices, not the entire network

A DDoS attack can impact a network by causing it to become slow or unresponsive, leading to service disruption and potential financial losses.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common types of malware and ransomware and how can they be prevented?

Never updating software and operating systems

Clicking on every email attachment and link

Using antivirus software, keeping software updated, being cautious of email attachments and links, and regularly backing up data

Using the same password for all accounts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe the concept of block chain and its key features.

Blockchain is a decentralized and distributed physical ledger that records transactions across multiple computers. Its key features include mutability, transparency, security, and centralization.

Blockchain is a centralized digital ledger that records transactions on a single computer. Its key features include mutability, opacity, insecurity, and centralization.

Blockchain is a decentralized and distributed digital ledger that records transactions across multiple computers. Its key features include immutability, transparency, security, and decentralization.

Blockchain is a centralized and distributed digital ledger that records transactions across multiple computers. Its key features include immutability, opacity, security, and decentralization.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common cyber security threats and how can individuals protect themselves from them?

Never updating software or systems

Using strong, unique passwords, enabling two-factor authentication, keeping software and systems updated, being cautious of phishing attempts, and using a reliable antivirus program.

Clicking on any link received in an email

Sharing passwords with friends and family

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does decentralized ledger technology contribute to the security of block chain?

It allows easy access to sensitive data

It increases the risk of single points of failure

It ensures data integrity and prevents single points of failure.

It has no impact on the security of block chain

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some strategies for preventing DDoS attacks?

Implementing strong network security measures, using DDoS protection services, deploying firewalls and intrusion prevention systems, and regularly monitoring network traffic for unusual patterns

Asking the attacker to stop the DDoS attack

Ignoring network security altogether

Installing more malware to counter the DDoS attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?