Information & Internet Security
Assessment
•
AJ Rovers
•
Computers
•
9th - 12th Grade
•
30 plays
•
Hard
Improve your activity
Higher order questions
Match
•
Reorder
•
Categorization
actions
Add similar questions
Add answer explanations
Translate quiz
Tag questions with standards
More options
15 questions
Show answers
1.
Multiple Choice
What is a cyberattack?
Steal a laptop from the computer shop
Send a fake email in order to get login credentials
Offer free vouchers without buying anything
Search the information from the dustbin
2.
Multiple Choice
What do we call a person who carries the cyberattack?
Terrorist
Punisher
Leader
Hacker
3.
Multiple Choice
The followings are the examples of malware EXCEPT
hardware
adware
trojan horse
spyware
4.
Multiple Choice
The attacker sends the fraudulent email in order to steal your sensitive data. This method is referred as ______ attack.
phishing
pharming
botnet
denial of service
5.
Multiple Choice
Identify the type of cyberattack where the hackers' system takes over the client's IP address.
DDOS attack
Man-in-the-middle attack
Phishing attack
Password attack
6.
Multiple Select
A strong password should have these criteria. (Tick all that apply)
minimum 8 characters
contains common words
start with number
hard to guess
Explore this activity with a free account
Find a similar activity
Create activity tailored to your needs using
Computer System
•
12th Grade - University
Introduction to Operating System
•
1st - 3rd Grade
Network Layer
•
University
Hackers?
•
University
Parts of Computer
•
1st Grade
Network Architecture
•
University
Utility Program
•
University
Components of Computer
•
KG - 1st Grade