Protecting Against Cybersecurity Threats: Draft Test

Protecting Against Cybersecurity Threats: Draft Test

Assessment

Flashcard

Information Technology (IT)

1st - 5th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

10 questions

Show all answers

1.

FLASHCARD QUESTION

Front

It attacks deceive recipients into revealing sensitive information, such as passwords or financial details, by masquerading as trustworthy entities.

Back

PHISHING

Answer explanation

Phishing attacks deceive recipients into revealing sensitive information, such as passwords or financial details, by masquerading as trustworthy entities.

2.

FLASHCARD QUESTION

Front

This form of malware locks users out of their systems or encrypts files, demanding a ransom for their release.

Back

RANSOMWARE

Answer explanation

Ransomware is a form of malware locks users out of their systems or encrypts files, demanding a ransom for their release.

3.

FLASHCARD QUESTION

Front

It covers various forms of harmful software designed to infiltrate, damage, or disable computers, systems, and networks.

Back

MALWARE

Answer explanation

Malware, or malicious software, covers various forms of harmful software designed to infiltrate, damage, or disable computers, systems, and networks.

4.

FLASHCARD QUESTION

Front

A type of malicious software, or malware, that spreads between computers and causes damage to data and software.

Back

VIRUS/VIRUSES

Answer explanation

Viruses is a type of malicious software, or malware, that spreads between computers and causes damage to data and software.

5.

FLASHCARD QUESTION

Front

It can include letters, numbers, and symbols, and they are typically created to be unique and difficult to guess.

Back

PASSWORD

Answer explanation

Passwords can include letters, numbers, and symbols, and they are typically created to be unique and difficult to guess.

6.

FLASHCARD QUESTION

Front

It requires a username/password verification and an SMS text verification.

Back

TWO-FACTOR AUTHENTICATION

Answer explanation

2FA requires a username/password verification and an SMS text verification.

7.

FLASHCARD QUESTION

Front

The following are an example of safe video conferencing practices, except? Mute yourself when not speaking. Be on time. Wear work-appropriate clothing. Browse social media

Back

Browse social media

Answer explanation

browsing social media while in a video conferencing may causes lack of focus and distraction.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?