Cyber Security Threats

Cyber Security Threats

10th Grade

8 Qs

quiz-placeholder

Similar activities

Comp.Sci

Comp.Sci

5th Grade - University

10 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

9th Grade - University

10 Qs

BTEC DIT C3 LAB - User Access Restriction

BTEC DIT C3 LAB - User Access Restriction

10th - 11th Grade

10 Qs

Physical vs Software restrictions

Physical vs Software restrictions

10th Grade

10 Qs

CS16 Networks Quiz 2 bit.ly/3STQgaZ

CS16 Networks Quiz 2 bit.ly/3STQgaZ

10th Grade

11 Qs

Cyber Security Recap

Cyber Security Recap

10th Grade

12 Qs

1.6 Threats to networks 1: People as the weak point

1.6 Threats to networks 1: People as the weak point

10th Grade

12 Qs

Unit 3 - 2.4.11 Application Attacks Part 1

Unit 3 - 2.4.11 Application Attacks Part 1

9th Grade - University

5 Qs

Cyber Security Threats

Cyber Security Threats

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Secret Shutp

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many types of malware are there?

2

10

9

8

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

It works in the background of a computer system and is difficult to detect.

Encrypting it and then demands the owners to pay money for the data to be decrypted.

It infects a computer when executed and then replicates itself to pass to another computer.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social Engineering is like a trick to gain people’s confidence, to gather information and gain unauthorized access to the computer system.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does DoS stands for?

Denial-of-Service

Device-of-Service

Device-of-Science

Denial-of-Science

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: DoS attacks are a type of network attack that results in some sort of __________ of _______  ________ to users, devices, or applications.

interruption, network attacks

interruption, network service

fights, network service

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: A _________ _____ attack is similar to a DoS attack but originates from multiple , coordinated sources.

Social Engineering

RootKit

Worms

Distributed DoS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Brute-force attacks do?

Is a large dictionary of passwords and their numerical values.

Combination of letters, numbers, and symbols in the password space until they get it right.

Intercepting  communications, other humans and machines can easily read plain text or unsecured passwords.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dictionary attacks means  intercepting  communications, other humans and machines can easily read plain text or unsecured passwords.

True

False