Learn: Cybersecurity Basics
Cambridge Nationals IT Level 1/Level 2
Ready to start this lesson?
Sign in to track your progress. 13 steps including 5 interactive questions.
Sign In to Start LearningStudents also studied
Browse allSteps in this lesson (13)
Match the items on the left with their correct pairs on the right
Match the items on the left with their correct pairs on the right
Which of the following is an example of malware?
Start the lesson to answer this multiple choice question
Match the items on the left with their correct pairs on the right
Match the items on the left with their correct pairs on the right
Start the lesson to answer this matching question
Match the items on the left with their correct pairs on the right
A {{blank0}} attack overwhelms a system with {{blank1}} to make it unavailable.
Start the lesson to answer this fill in the blank question
Match the items on the left with their correct pairs on the right
Which of the following can prevent brute force attacks?
Start the lesson to answer this multiple choice question
Match the items on the left with their correct pairs on the right
Which of the following are examples of 2-factor authentication? (Select all that apply)
Start the lesson to answer this multi-select question
Match the items on the left with their correct pairs on the right
Match the items on the left with their correct pairs on the right

Want to Learn More?
Get personalised lessons, quizzes, and instant feedback from your AI tutor.
Explore More Topics