Unit 7- Lesson 4- Net Attacks DoS

Unit 7- Lesson 4- Net Attacks DoS

9th - 12th Grade

6 Qs

quiz-placeholder

Similar activities

Found. of IT: Security Threats - A

Found. of IT: Security Threats - A

9th - 12th Grade

10 Qs

BTEC cyber security

BTEC cyber security

9th - 12th Grade

10 Qs

IT English Essentials: Unit 9 - Quiz 1

IT English Essentials: Unit 9 - Quiz 1

12th Grade

10 Qs

Unit 3 - 2.3.1 Application Vulnerabilitites

Unit 3 - 2.3.1 Application Vulnerabilitites

9th Grade - University

6 Qs

System Threats and Vulnerablitiles

System Threats and Vulnerablitiles

10th Grade

10 Qs

1.2 Comp Programming - Understanding the CIA Triad

1.2 Comp Programming - Understanding the CIA Triad

9th Grade

10 Qs

Computing Revision

Computing Revision

9th Grade

6 Qs

Dos Attack

Dos Attack

10th Grade

8 Qs

Unit 7- Lesson 4- Net Attacks DoS

Unit 7- Lesson 4- Net Attacks DoS

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Wayground Content

Used 13+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DoS (Denial of Service)

An attack that overwhelms a system, making it unavailable to users.

A method to enhance system performance by distributing load.

A security measure to protect against unauthorized access.

A technique to improve data retrieval speed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Zombies

Infected devices controlled remotely by attackers in a botnet.

A type of undead creature in horror fiction.

A popular video game character known for eating brains.

A term for a person who is lethargic and unresponsive.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SYN Flood

A DDoS attack that exhausts system resources by initiating multiple incomplete connections.

A type of phishing attack that targets email accounts.

A method of encrypting data to prevent unauthorized access.

A technique used to improve network performance by reducing latency.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DDoS (Distributed Denial of Service)

A large-scale attack using multiple systems to flood a target.

A method to enhance network security by blocking traffic.

A technique for data encryption in transit.

A type of malware that infects multiple devices.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Redundant

A backup or extra resource to ensure reliability in case of failure.

A type of software that enhances performance.

A method of data encryption for security.

A process of eliminating unnecessary steps in a workflow.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Botnet

A type of malware that encrypts files on a computer.

A network of compromised computers used to launch cyberattacks.

A software used for creating secure passwords.

A firewall that protects against unauthorized access.