
1.4 Lesson 1
Authored by Raja Khan
Computers
9th Grade
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes phishing?
A. Stealing data by exploiting vulnerabilities in code
B. Tricking users into sharing sensitive information via fake emails or websites
C. Overwhelming a server with too many requests
D. Gaining unauthorised access by guessing passwords
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
A. Software designed to protect devices
B. A type of phishing attack
C. Malicious software designed to harm or exploit systems
D. Unauthorised access to a database
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a brute force attack?
A. Using a large number of random password attempts to gain access
B. Sending fake emails to trick users
C. Infecting computers with a virus
D. Disrupting a system with too many requests
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the goal of a Denial-of-Service (DoS) attack?
A. To spread malicious software
B. To gather personal data
C. To disrupt the normal operations of a server
D. To steal usernames and password
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which vulnerability does an SQL injection attack exploit?
A. Weak passwords
B. Flaws in database query handling
C. Lack of user authentication
D. Unauthorised email access
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can an organisation reduce the risk of phishing attacks?
A. Use firewalls
B. Educate employees about suspicious emails and links
C. Encrypt data at rest
D. Update database management systems regularly
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What distinguishes a worm from a virus?
A. Worms require user action to spread, while viruses do not
B. Worms spread automatically, while viruses often rely on user actions
C. Worms are a form of social engineering, but viruses are not
D. Worms only target networks, while viruses only target computers
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Licencias de Software
Quiz
•
9th - 10th Grade
10 questions
Visual Basic 2010
Quiz
•
8th Grade - University
9 questions
IT related jobs
Quiz
•
9th Grade
10 questions
S2 Subject Choice Quiz
Quiz
•
8th - 10th Grade
10 questions
Contact Center Sevices
Quiz
•
7th - 10th Grade
10 questions
Sistema Operativo Android
Quiz
•
9th - 12th Grade
15 questions
Security
Quiz
•
9th Grade
13 questions
Prueba Diagnostica de Tecnología
Quiz
•
6th Grade - University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Computers
10 questions
Navigating Digital Citizenship and Online Safety
Interactive video
•
6th - 10th Grade
20 questions
Computer / Internet Companies
Quiz
•
9th Grade
10 questions
Exploring the Basics of Google Sheets
Interactive video
•
9th Grade
10 questions
Exponent Rules
Quiz
•
9th - 12th Grade
20 questions
JavaScript - Karel
Quiz
•
9th - 10th Grade