Unit 13 Cyber Defense

Unit 13 Cyber Defense

8th Grade

20 Qs

quiz-placeholder

Similar activities

SCRATCH

SCRATCH

8th Grade

20 Qs

SDA Chapter 5 Vocabulary

SDA Chapter 5 Vocabulary

7th - 9th Grade

21 Qs

Arquitectura informática

Arquitectura informática

8th Grade

20 Qs

Método científico

Método científico

7th - 11th Grade

20 Qs

Repaso 1. Proceso Tecnológico

Repaso 1. Proceso Tecnológico

8th Grade

15 Qs

Brick and Block Walls (The Basics.).

Brick and Block Walls (The Basics.).

8th Grade

15 Qs

Diagramme enthalpique

Diagramme enthalpique

7th - 10th Grade

15 Qs

Iman kepada Qada dan Qadar

Iman kepada Qada dan Qadar

7th - 9th Grade

20 Qs

Unit 13 Cyber Defense

Unit 13 Cyber Defense

Assessment

Quiz

Instructional Technology

8th Grade

Practice Problem

Hard

CCSS
RI.5.5, RI.7.7, RI.6.5

+7

Standards-aligned

Created by

Kristie Hernandez

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a Distributed Denial of Service (DDoS) attack?

An attempt to deny access to a website by flooding the website’s servers with millions of requests from different computers
An attempt by a government to deny Internet access to its citizens
An attempt by one user to deny service to another user by posting malicious material on a social network
An attempt by an Internet user to access private information stored in a private database

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Cybercriminals typically look for a system _______ to exploit for their own benefit.

with vulnerabilities
with a virus
without a firewall
with a strong password

Tags

CCSS.RI.5.5

CCSS.RI.6.5

CCSS.RI.7.5

CCSS.RI.8.5

CCSS.RI.9-10.5

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

There has been a recent attack on the organization that you are interning for. Your manager knows that multiple computers were used to carry out the attack. Which type of attack uses more than one computer to carry out the attack?

DDos
Man-in-the-middle attack
Worm
XSS

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Your friend receives a DM (direct message) in her social media account. When she clicks on the link provided, she is prompted to put in her username and password. She doesn’t trust that this account is who they say they are. What type of attack attempts to insert a computer or system between two systems that are communicating?

Man-in-the-middle attack
DDos
Worm
XSS

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which type of attack blocks authorized users from accessing their network?

Dos
Social engineering
Rootkit
XSS

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You are using your browser to research a topic for an upcoming project. When you visit one site in particular, you are instantly redirected to a site that does not seem safe. What type of attack could you have just experienced?

XSS
DDos
SQLi
Worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is ransomware?

Software that holds your data hostage until you send the attackers money.
A form of cryptocurrency.
Software used to protect your computer from harmful viruses.
Computer equipment that is stolen and held hostage until you pay the attackers.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?