3.6 - Cyber Security

3.6 - Cyber Security

10th Grade

15 Qs

quiz-placeholder

Similar activities

DBMS

DBMS

9th - 10th Grade

20 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

Higher Computing SDD Revision

Higher Computing SDD Revision

10th Grade

15 Qs

Networks - OCR Computer Science

Networks - OCR Computer Science

10th Grade

19 Qs

1.8 Ethical, legal, cultural and environmental concerns

1.8 Ethical, legal, cultural and environmental concerns

10th - 11th Grade

14 Qs

OCR GCSE Computer Science: 1.1 Architecture (Part 1)

OCR GCSE Computer Science: 1.1 Architecture (Part 1)

10th Grade

17 Qs

WJEC GCSE Computer Science - Security

WJEC GCSE Computer Science - Security

9th - 10th Grade

18 Qs

GCSE Computing 1.7 Operating Systems #1

GCSE Computing 1.7 Operating Systems #1

10th - 11th Grade

10 Qs

3.6 - Cyber Security

3.6 - Cyber Security

Assessment

Quiz

Computers

10th Grade

Easy

Created by

P Upstone-Bailey

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of cyber security?

To increase internet speed

To protect computers, networks, and data from unauthorized access, attacks, or damage

To develop new software applications

To reduce electricity consumption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Virus

Worm

Firewall

Trojan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing primarily used for?

To catch fish

To obtain sensitive information by pretending to be a trustworthy entity

To improve computer performance

To create backup copies of data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method involves systematically trying all possible combinations to decode encrypted data?

Phishing

Brute Force Attack

SQL Injection

Social Engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a Denial of Service (DoS) attack?

To improve system efficiency

To make a system unavailable to users by overwhelming it with traffic

To protect data from interception

To encrypt sensitive information

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a code injection technique that exploits vulnerabilities in a database?

Phishing

SQL Injection

Brute Force Attack

Data Interception

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does social engineering primarily involve?

Building social networks

Manipulating individuals into divulging confidential information

Designing social media platforms

Developing engineering software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?