1.4 Lesson 1

1.4 Lesson 1

9th Grade

10 Qs

quiz-placeholder

Similar activities

cyber security

cyber security

9th Grade

11 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

Password Safety & Security

Password Safety & Security

KG - Professional Development

11 Qs

Cybersecurity threats 1

Cybersecurity threats 1

9th Grade

10 Qs

Internet and Networking Quiz

Internet and Networking Quiz

9th - 12th Grade

15 Qs

2.2 Passwords

2.2 Passwords

9th - 10th Grade

10 Qs

Network Security and Threat Prevention Quiz

Network Security and Threat Prevention Quiz

9th Grade

10 Qs

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

11 Qs

1.4 Lesson 1

1.4 Lesson 1

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Raja Khan

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes phishing?

A. Stealing data by exploiting vulnerabilities in code

B. Tricking users into sharing sensitive information via fake emails or websites

C. Overwhelming a server with too many requests

D. Gaining unauthorised access by guessing passwords

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A. Software designed to protect devices

B. A type of phishing attack

C. Malicious software designed to harm or exploit systems

D. Unauthorised access to a database

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute force attack?

A. Using a large number of random password attempts to gain access

B. Sending fake emails to trick users

C. Infecting computers with a virus

D. Disrupting a system with too many requests

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of a Denial-of-Service (DoS) attack?

A. To spread malicious software

B. To gather personal data

C. To disrupt the normal operations of a server

D. To steal usernames and password

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vulnerability does an SQL injection attack exploit?

A. Weak passwords

B. Flaws in database query handling

C. Lack of user authentication

D. Unauthorised email access

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can an organisation reduce the risk of phishing attacks?

A. Use firewalls

B. Educate employees about suspicious emails and links

C. Encrypt data at rest

D. Update database management systems regularly

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes a worm from a virus?

A. Worms require user action to spread, while viruses do not

B. Worms spread automatically, while viruses often rely on user actions

C. Worms are a form of social engineering, but viruses are not

D. Worms only target networks, while viruses only target computers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?