Cybersecurity

Cybersecurity

12th Grade

10 Qs

quiz-placeholder

Similar activities

L3 - Script Kiddies

L3 - Script Kiddies

9th - 12th Grade

7 Qs

Unit 1 LO5 Ethical and Operational Issues and Threats

Unit 1 LO5 Ethical and Operational Issues and Threats

12th Grade

15 Qs

Cybersecurity

Cybersecurity

8th - 12th Grade

10 Qs

Fundamentals of CS - Legal Considerations

Fundamentals of CS - Legal Considerations

3rd - 12th Grade

10 Qs

Cyber Security

Cyber Security

8th - 12th Grade

10 Qs

H Plenary - Computer Misuse Act 1990

H Plenary - Computer Misuse Act 1990

9th Grade - University

6 Qs

Cyber security

Cyber security

12th Grade

10 Qs

Communication & Networking - Advantages of Networking

Communication & Networking - Advantages of Networking

3rd - 12th Grade

10 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Mark Gadsby

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In 2015, TalkTalk experienced a cyber attack that resulted in the theft of 160,000 customers' banking details. What type of attack was it?

Ransomware Worm

Zero-Day Exploit

Distributed Denial of Service

SQL Injection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Act of Parliament provides protection against hacking?

General Data Protection Regulation (GDPR)

Regulation of Investigatory Powers Act 2000

Computer Misuse Act 1990

Copyright, Designs and Patents Act 1988

3.

MATCH QUESTION

1 min • 1 pt

Match the passwords to their 2023 popularity

23.2 million

123456

7 million

Pokemon

250,000

LiverpoolFC

631,000

qwerty

21 million

Eva

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hardware hack defeated the iPhone 5C passcode security?

Boot ROM mining

NAND reflecting

NAND mirroring

NOR mirroring

5.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Do you think the dynamic pricing employed by Ticketmaster when selling Oasis tickets constitutes a scam?

Yes

No

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Through which device did hackers gain access to the global marine Terminal Operating System?

Personal Computer

Lightbulb

Fridge

Toothbrush

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a canary in cybersecurity?

To monitor network traffic for unauthorised access

To act as a decoy to detect intrusions or unauthorised activity

To prevent data breaches by encrypting sensitive information

To provide backup for data storage in case of a breach

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers