Search Header Logo

1.4 Lesson 1

Authored by Raja Khan

Computers

9th Grade

Used 10+ times

1.4 Lesson 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes phishing?

A. Stealing data by exploiting vulnerabilities in code

B. Tricking users into sharing sensitive information via fake emails or websites

C. Overwhelming a server with too many requests

D. Gaining unauthorised access by guessing passwords

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A. Software designed to protect devices

B. A type of phishing attack

C. Malicious software designed to harm or exploit systems

D. Unauthorised access to a database

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute force attack?

A. Using a large number of random password attempts to gain access

B. Sending fake emails to trick users

C. Infecting computers with a virus

D. Disrupting a system with too many requests

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of a Denial-of-Service (DoS) attack?

A. To spread malicious software

B. To gather personal data

C. To disrupt the normal operations of a server

D. To steal usernames and password

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vulnerability does an SQL injection attack exploit?

A. Weak passwords

B. Flaws in database query handling

C. Lack of user authentication

D. Unauthorised email access

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can an organisation reduce the risk of phishing attacks?

A. Use firewalls

B. Educate employees about suspicious emails and links

C. Encrypt data at rest

D. Update database management systems regularly

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes a worm from a virus?

A. Worms require user action to spread, while viruses do not

B. Worms spread automatically, while viruses often rely on user actions

C. Worms are a form of social engineering, but viruses are not

D. Worms only target networks, while viruses only target computers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?