Shell Cyber Threats Quiz

Shell Cyber Threats Quiz

8th Grade

16 Qs

quiz-placeholder

Similar activities

School Event- Networking and Cyber Security Quiz

School Event- Networking and Cyber Security Quiz

6th - 8th Grade

12 Qs

Cyber Security

Cyber Security

6th - 8th Grade

16 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

Year 9 Cybersecurity knowledge check

Year 9 Cybersecurity knowledge check

8th Grade

12 Qs

SOCIAL ENGINEERING

SOCIAL ENGINEERING

8th Grade

16 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Shell Cyber Threats Quiz

Shell Cyber Threats Quiz

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Mikey Lear

Used 17+ times

FREE Resource

16 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the word for cyber attacks which use people as a weak point?

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS?

Many computers being infected with malware

Many computers stealing data from another computer

Many computers overwhelming a server

Systematically trying every password until you get the right one

3.

CLASSIFICATION QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Malware

,

(b) Social engineering

Phishing

Trojan

Blagging

Shouldering

Virus

Ransomeware

4.

DROPDOWN QUESTION

1 min • 1 pt

Phishing is a type of cybercrime where attackers try to trick you into giving away ​ (a)   , like passwords or credit card numbers, by pretending to be a ​ (b)   source. They often use ​ (c)   emails, messages, or websites that look real to lure you into clicking ​ (d)   or providing sensitive information.

personal information
money
trustworthy
fake
invisible
links
attachments

5.

MATCH QUESTION

1 min • 1 pt

Match the following

Stops viruses entering a network

Firewall

Gets personal information

Brute force

Disrupts a service

DDoS

Works out a password

Name generator attack

Shows adverts

Adware

6.

DRAG AND DROP QUESTION

1 min • 1 pt

A ​ (a)   acts as a barrier between your computer network and threats from the internet, monitoring incoming and outgoing ​ (b)   to block unauthorised access. It can help defend against Distributed Denial of Service (​ (c)   ) attacks by filtering out ​ (d)   requests from malicious sources, and it can prevent ​ (e)   by blocking harmful data packets that attempt to enter the system

firewall
traffic
DDoS
excessive
viruses
unknown
server

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is information without context, and therefore without meaning?

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?