Search Header Logo
4) Security Risks Part 2

4) Security Risks Part 2

Assessment

Interactive Video

Computers

9th Grade

Practice Problem

Easy

Created by

Maria Cruz Farooqi

Used 8+ times

FREE Resource

14 questions

Show all answers

1.

SLIDE QUESTION

30 sec • Ungraded

2.

SLIDE QUESTION

30 sec • Ungraded

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your friend suspects their computer was compromised. What could be happening if their keystrokes are being recorded without their knowledge?

Their computer might be recording mouse movements.

Their computer might be using a type of encryption to secure data.

Their computer might be tracking eye movements on the screen.

Their computer might be affected by keylogging.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information is called ___.

encryption

keylogging

malware

phishing

5.

SLIDE QUESTION

30 sec • Ungraded

6.

DROPDOWN QUESTION

1 min • 1 pt

Media Image

1) The message is sent from a public email domain

No legitimate organization will send emails from an address that ends ‘@gmail.com’.

Not even ​ (a)   .

Except for some small operations, most companies will have their own ​ (b)   . For example, genuine emails from Google will read ‘@google.com’. If the domain name (the bit after the @ symbol) matches the apparent sender of the email, the message is probably ​ (c)   . By contrast, if the email comes from an address that isn’t affiliated with the apparent sender, it’s almost certainly a ​ (d)   .

Google
email domain and email accounts
legitimate
scam

7.

DROPDOWN QUESTION

1 min • 1 pt

Media Image

2) The domain name is misspelt

There’s another clue hidden in ​ (a)   that provides a strong indication of phishing scams ­– unfortunately, it complicates our previous clue.

The problem is that ​ (b)   a domain name from a registrar. And although every domain name must be unique, there are plenty of ways to create addresses that are​ (c)   from the one that’s being spoofed.

domain names
anyone can buy
indistinguishable

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?