Shell Cyber Threats Quiz

Shell Cyber Threats Quiz

8th Grade

16 Qs

quiz-placeholder

Similar activities

Risks, Precautions & Laws

Risks, Precautions & Laws

8th Grade

12 Qs

Quiz 3: Internet safety, cyber security and encryption

Quiz 3: Internet safety, cyber security and encryption

7th - 8th Grade

13 Qs

Bezpieczeństwo w sieci - 2 termin

Bezpieczeństwo w sieci - 2 termin

7th - 8th Grade

12 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

Grade 8 - ELT

Grade 8 - ELT

8th Grade

20 Qs

Cyber Security

Cyber Security

6th - 8th Grade

16 Qs

L3 - Cyber Security

L3 - Cyber Security

8th Grade

14 Qs

AB Informationssicherheit

AB Informationssicherheit

8th Grade

17 Qs

Shell Cyber Threats Quiz

Shell Cyber Threats Quiz

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Mikey Lear

Used 17+ times

FREE Resource

16 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the word for cyber attacks which use people as a weak point?

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS?

Many computers being infected with malware

Many computers stealing data from another computer

Many computers overwhelming a server

Systematically trying every password until you get the right one

3.

CLASSIFICATION QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Malware

,

(b) Social engineering

Blagging

Shouldering

Ransomeware

Trojan

Phishing

Virus

4.

DROPDOWN QUESTION

1 min • 1 pt

Phishing is a type of cybercrime where attackers try to trick you into giving away ​ (a)   , like passwords or credit card numbers, by pretending to be a ​ (b)   source. They often use ​ (c)   emails, messages, or websites that look real to lure you into clicking ​ (d)   or providing sensitive information.

personal information
money
trustworthy
fake
invisible
links
attachments

5.

MATCH QUESTION

1 min • 1 pt

Match the following

Disrupts a service

Name generator attack

Works out a password

Adware

Shows adverts

DDoS

Gets personal information

Brute force

Stops viruses entering a network

Firewall

6.

DRAG AND DROP QUESTION

1 min • 1 pt

A ​ (a)   acts as a barrier between your computer network and threats from the internet, monitoring incoming and outgoing ​ (b)   to block unauthorised access. It can help defend against Distributed Denial of Service (​ (c)   ) attacks by filtering out ​ (d)   requests from malicious sources, and it can prevent ​ (e)   by blocking harmful data packets that attempt to enter the system

firewall
traffic
DDoS
excessive
viruses
unknown
server

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is information without context, and therefore without meaning?

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?