BTEC cyber security

BTEC cyber security

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

threats to computer systems and networks

threats to computer systems and networks

9th Grade

15 Qs

Quiz sobre Seguridad en la Red

Quiz sobre Seguridad en la Red

11th Grade

15 Qs

1.5.5 - Starter Task/Digital Footprint

1.5.5 - Starter Task/Digital Footprint

11th Grade

11 Qs

Ciberinteligencia

Ciberinteligencia

12th Grade

13 Qs

Threat Prevention

Threat Prevention

11th Grade

14 Qs

eSecurity

eSecurity

11th Grade

10 Qs

Revision OCR J277 1.1-1.4

Revision OCR J277 1.1-1.4

10th - 11th Grade

15 Qs

S3 Computing Security Quiz

S3 Computing Security Quiz

KG - University

10 Qs

BTEC cyber security

BTEC cyber security

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

doxtorfrango 2.0

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the below describes a Firewall

Can be hardware or software based, they use a set of rules that filter suspicious network packets from remote networks.

Preventing unauthorized access

.Data stored by a web browser until it is closed.

A wall of fire used to stop viruses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Floods a computer

with requests so it is unable to

respond to legitimate

requests.

Denial of Service

(DDoS)

Malware

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed is known as?


Ransomware

Virus

Spam

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Between these two hackers, which one can you hire to help you in your company?

white hat

black hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a program that is used to detect, prevent, and remove malware?

Antivirus

Firewall

Adware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method used by attackers to trick users into giving them their passwords?

Phishing

SQL Injection

Brute Force Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the practice of sending fraudulent emails resembling emails from reputable sources, to steal personal information?

Phishing

Spoofing

Keylogging

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?