Studio - Camb Tech - U3 - Cyber Security Key Terms Quiz

Studio - Camb Tech - U3 - Cyber Security Key Terms Quiz

9th Grade

15 Qs

quiz-placeholder

Similar activities

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

ICT

ICT

9th - 11th Grade

15 Qs

Malware

Malware

9th - 11th Grade

15 Qs

Welcome to Cyber Security

Welcome to Cyber Security

7th - 12th Grade

10 Qs

Internet of Things

Internet of Things

9th - 12th Grade

10 Qs

OCR Computer Science Networks

OCR Computer Science Networks

9th Grade

19 Qs

1.3 - Client-Server and Peer to Peer Networks

1.3 - Client-Server and Peer to Peer Networks

8th - 10th Grade

15 Qs

Studio - Camb Tech - U3 - Cyber Security Key Terms Quiz

Studio - Camb Tech - U3 - Cyber Security Key Terms Quiz

Assessment

Quiz

Computers

9th Grade

Easy

Created by

Andy Johnson

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of access management in a computer system/network?

To manage the access to a computer system/network

To manage the speed of the internet connection

To manage the temperature of the computer system

To manage the color scheme of the computer system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does account lockout do in a computer system?

Locks any account when a user fails a login attempt more than a set number of times

Locks the computer system after a certain time of inactivity

Locks the keyboard and mouse of the computer system

Locks the computer system from accessing the internet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of anti-malware software?

To prevent, detect and eradicate malicious software

To create new types of malicious software

To enhance the speed of the computer system

To track the user's online activities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does an anomaly based software do in a computer system?

Detects computer intrusions and misuse by monitoring system activity

Monitors the user's internet browsing history

Monitors the temperature of the computer system

Monitors the user's social media activities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered as an asset in the context of cyber security?

Social media platforms

Internet service providers

Computer hardware and software

Data, finance and secrets that should be secured against cyber security incidents

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who are attackers in the context of cyber security?

Individuals or organisations that protect computer systems/networks

Individuals or organisations that use computer systems/networks legally

Individuals or organisations that target computer systems/networks illegally

Individuals or organisations that develop computer systems/networks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an audit trail in a computer system/network?

A record of activities on a computer system/network

A record of internet browsing history

A record of social media activities

A record of computer hardware and software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?