
1.4 Lesson 1
Quiz
•
Computers
•
9th Grade
•
Medium

Raja Khan
Used 9+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes phishing?
A. Stealing data by exploiting vulnerabilities in code
B. Tricking users into sharing sensitive information via fake emails or websites
C. Overwhelming a server with too many requests
D. Gaining unauthorised access by guessing passwords
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
A. Software designed to protect devices
B. A type of phishing attack
C. Malicious software designed to harm or exploit systems
D. Unauthorised access to a database
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a brute force attack?
A. Using a large number of random password attempts to gain access
B. Sending fake emails to trick users
C. Infecting computers with a virus
D. Disrupting a system with too many requests
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the goal of a Denial-of-Service (DoS) attack?
A. To spread malicious software
B. To gather personal data
C. To disrupt the normal operations of a server
D. To steal usernames and password
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which vulnerability does an SQL injection attack exploit?
A. Weak passwords
B. Flaws in database query handling
C. Lack of user authentication
D. Unauthorised email access
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can an organisation reduce the risk of phishing attacks?
A. Use firewalls
B. Educate employees about suspicious emails and links
C. Encrypt data at rest
D. Update database management systems regularly
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What distinguishes a worm from a virus?
A. Worms require user action to spread, while viruses do not
B. Worms spread automatically, while viruses often rely on user actions
C. Worms are a form of social engineering, but viruses are not
D. Worms only target networks, while viruses only target computers
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
10 questions
Cybersecurity - Device Security
Quiz
•
9th - 12th Grade
10 questions
Google Docs - Tables
Quiz
•
9th - 10th Grade
14 questions
Threats to computer systems and networks
Quiz
•
9th - 11th Grade
10 questions
Understanding Cybersecurity
Quiz
•
5th Grade - Professio...
15 questions
Information & Internet Security
Quiz
•
9th - 12th Grade
11 questions
ICT - Networks and communication
Quiz
•
9th Grade
10 questions
Cybercrime
Quiz
•
7th - 10th Grade
10 questions
Passwords and Fundamental Counting Principle
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
30 questions
Computer Terminology Exercise #1 ( Fill Ins)
Quiz
•
9th Grade
15 questions
MLA Formatting
Quiz
•
9th Grade
20 questions
Typing Practice
Quiz
•
7th - 12th Grade
14 questions
Inputs and Outputs: Computer Science Intro
Lesson
•
5th - 9th Grade
20 questions
Google Sheets Quiz
Quiz
•
9th Grade