Cyber Security Topics in IGCSE Computer Science

Cyber Security Topics in IGCSE Computer Science

8th Grade

46 Qs

quiz-placeholder

Similar activities

Year 8: End of Year Assessment

Year 8: End of Year Assessment

8th Grade

47 Qs

KS3 Spr1 CCCS

KS3 Spr1 CCCS

6th - 8th Grade

50 Qs

ITF Unit 2 System Administration Test Review

ITF Unit 2 System Administration Test Review

8th Grade

50 Qs

Year 8 Unit 2 Assessment

Year 8 Unit 2 Assessment

8th Grade

45 Qs

B3 Security Policies

B3 Security Policies

1st - 12th Grade

50 Qs

testcs051-100

testcs051-100

1st - 12th Grade

51 Qs

Pear Tree Computing

Pear Tree Computing

6th - 8th Grade

46 Qs

KELAS 8

KELAS 8

8th Grade

45 Qs

Cyber Security Topics in IGCSE Computer Science

Cyber Security Topics in IGCSE Computer Science

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Shervon Yak

Used 1+ times

FREE Resource

46 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What is a type of malware that replicates itself to spread to other computers?

Evaluate responses using AI:

OFF

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of social engineering attack that involves tricking someone into giving out confidential information is called:

Phishing

Brute Force

Denial of Service

SQL Injection

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Which network security threat involves overwhelming a system with traffic to make it unavailable?

Evaluate responses using AI:

OFF

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a security measure that involves verifying the identity of a user before granting access?

Authentication

Encryption

Firewall

Antivirus

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Which type of malware is designed to demand payment to restore access to data?

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term for a social engineering attack that involves creating a fake website to steal information is called:

Phishing

Vishing

Smishing

Pharming

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security threat that involves unauthorized access to data during transmission is called:

Phishing

Eavesdropping

Spoofing

Denial of Service

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?