Share/Like This Page
Print Instructions

NOTE: Only your test content will print.
To preview this test, click on the File menu and select Print Preview.

See our guide on How To Change Browser Print Settings to customize headers and footers before printing.

Cyber Security (Grade 10)

Print Test (Only the test content will print)

Cyber Security

The major difference between HTTPS and HTTP is that with HTTPS data is always
  1. encrypted.
  2. private.
  3. public.
  4. virus-free.
Which of the following describes a group of Internet-connected devices that can be used to send email spam, click fraud or denial of service attacks?
  1. Botnet
  2. DDos
  3. Malware
  4. Rootkit
Which of the following could best be described as a denial of service attack in which multiple compromised systems are used to flood a targeted system with traffic?
  1. Botnet
  2. DDos
  3. Malware
  4. Rootkit
Which of the following describes a collection of tools or programs that provide the user with administrator access to a network and that can allow that user to change settings to make malware undetectable?
  1. Botnet
  2. DDos
  3. Malware
  4. Rootkit
Which of the following are examples of two-factor authentication? Check all that apply.
  1. Password & Captcha
  2. Birthdate & Password
  3. PinCode & Fingerprint
  4. Voice Print & Password
Two Factor Authentication requires the user to have two of three types of credentials. List the three types of credentials with an example of each.

What are two security advantages of a Virtual Private Network?

List three elements of a secure password.

In order to protect company data, security experts often recommend a separate network for
  1. laptops.
  2. mobile devices.
  3. Internet of Things.
  4. different departments.
Is private browsing truly private?

You need to be a member to access free printables.
Already a member? Log in for access.    |    Go Back To Previous Page