1) What is the primary objective of phishing attacks? a) To spread computer viruses b) To gain unauthorized access to computer systems c) To trick individuals into revealing sensitive information d) To conduct denial-of-service attacks 2) What distinguishes White Hat hackers from Black Hat hackers? a) White Hats work for government agencies, while Black Hats work independently. b) White Hats engage in ethical hacking, while Black Hats engage in malicious hacking. c) White Hats primarily target corporations, while Black Hats target individuals. d) White Hats use advanced hacking techniques, while Black Hats use basic methods. 3) What is ransomware designed to do? a) Record keystrokes on infected computers b) Encrypt files or lock a user's system until a ransom is paid c) Block access to websites and online services d) Create backdoors for remote access to infected computers 4) Which of the following is an example of a Trojan Horse malware? a) WannaCry b) Zeus Trojan c) Mirai Botnet d) Stuxnet 5) What safety measure can individuals and organizations take to protect against Trojan Horse malware? a) Installing reputable antivirus software b) Disabling firewalls to improve network performance c) Ignoring software updates to avoid potential compatibility issues d) Sharing sensitive information freely on social media platforms 6) How does a firewall contribute to cyber security defences? a) By scanning emails for phishing attempts b) By encrypting data transmitted over the internet c) By preventing unauthorized access to computer networks d) By automatically updating software with the latest security patches 7) What role do security patches play in maintaining system security? a) They provide physical security for computer hardware. b) They encrypt sensitive data stored on computer systems. c) They fix known vulnerabilities in software and operating systems. d) They prevent unauthorised access to network devices. 8) What is the primary goal of user education in cybersecurity awareness? a) To increase awareness of the latest malware trends b) To encourage users to share their passwords with colleagues c) To prevent individuals from clicking on suspicious links or attachments d) To provide advanced training in ethical hacking techniques

Year 10 Computing Cyber security

Autor

Top-lista

Vizualni stil

Postavke

Promijeni predložak

Vrati automatski spremljeno: ?