
Cyber Security
Quiz by GCSE Computer Science Teacher 3
GCSE (AQA)
Computer Science
English National Curriculum
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measures 1 skill from
Measures 1 skill from
Track each student's skills and progress in your Mastery dashboards
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
14 questions
Show answers
- Q1What is cyber security?Ensuring that the government can access everyone online activityThe techniques of protecting computers and networks unauthorised access or cyber attacksWhen someone attempts to gain unauthorised access or cause damage to a computer or networkRestricting childrens access to age appropriate web pages and apps45s3.6.1.a
- Q2What are audit trails used for?Ensuring your computer isn't infected by virusMaintaining security and for recovering lost dataEnsuring your computer is secure from white hat hackersEnsuring the trail of computer energy flow45s3.6.1.a
- Q3Why is cyber security becoming more challenging?As more information is being held online, there are more areas to exploitThere is not enough money being invested in cyber securityThere are less people working in cyber secuirtyThe number of hackers are reducing45s3.6.1.a
- Q4Why are cloud based services targeted for hacking?Because they now store so much personal informaitonBecause you can then access everyone computersBecause they are easier to hackBecause these companies make so much money45s3.6.1.a
- Q5What is a common piece of software that individuals can use to protect their own computer from cyber attacks?A firewallAnti Virus SoftwareMicrosoft OfficePassword lock boxes45s3.6.1.a
- Q6Who is responsible for ensuring Cyber Security in a company?Systems Security ManagerEveryoneNetwork ManagerEmployees45s3.6.1.a
- Q7Which of these can cyber security not protect against?Slow hardware performanceBrute force hackingMalwareSocial Engineering45s3.6.1.a
- Q8What is preventative cyber security?Looking for ways to stop cyber attacks happening in the first placeDeliberately hacking your own network to test its capabilitiesResponding to cyber attacks on a case by case basisEnsuring that software in the newest release available45s3.6.1.a
- Q9What is reactive cyber security?Looking for ways to stop cyber attacks happening in the first placeDeliberately hacking your own network to test its capabilitiesEnsuring that software in the newest release availableResponding to cyber attacks on a case by case basis45s3.6.1.a
- Q10Which of these is not a cyber security method?Installing anti virus softwareHaving an User Acceptance PolicyTurning off your computer when you leave itRestarting your computer regularly to push for updates45s3.6.1.a
- Q11Why are User Acceptance Policies so important for cyber security?They help educate users of the network about how to keep it safeTo limit the number of users to a networkSo that users of the network know what websites are bannedSo that companies can track users emails and web-usage45s3.6.1.a
- Q12What did hackers of the Sony PlayStation 2011 attacks release?Customers security details, including credit card informationThe records of the lowest scoring playersCheat codes for new games coming outEmployees security details45s3.6.1.a
- Q13What are the reasons that people will try to hack a network?For moneyAll of theseFor funFor revenge45s3.6.1.a
- Q14What is considered to be the biggest threat to a network?Cheap softwareUsing older versions of operating systemsSlow or old machinesPeople themselves45s3.6.1.a