Security

Security

10th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Cyber Security and Social Engineering

Cyber Security and Social Engineering

9th - 11th Grade

18 Qs

2025 python class first quiz

2025 python class first quiz

9th Grade - University

10 Qs

fnaf sister location

fnaf sister location

4th Grade - University

10 Qs

Review for Midterm Test ICT 3

Review for Midterm Test ICT 3

1st - 11th Grade

15 Qs

General Ict Quiz

General Ict Quiz

4th Grade - University

15 Qs

OS Essentials Chp11: Windows Configuration Quiz on 11.5 to 11.7

OS Essentials Chp11: Windows Configuration Quiz on 11.5 to 11.7

11th - 12th Grade

10 Qs

Network topologies

Network topologies

8th Grade - University

20 Qs

Basics of spreadsheet

Basics of spreadsheet

12th Grade

15 Qs

Security

Security

Assessment

Quiz

Computers

10th - 12th Grade

Hard

Created by

Hilda Dempsey

Used 12+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a broad term used for many attacks on computer systems?
Adware
Malware
Ransomeware
Spyware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a rogue application that appears to do something useful but also does something malicious?
Spyware
Trojan Horse
Virus
Malware

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a form of social engineering in which you simply ask someone for a piece of information you are missing by making it look as if it is a legitimate request?
Phishing
Whaling
Vishing
Pharming

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an Internet messaging attack that is propagated through IM instead of e-mail?
Spam
Whaling
Spim
Phising

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a human based attack where the goal is to extract personal, financial, or confidential information from the victim using services such as the telephone system and internet based voice messaging services?
Phishing
Vishing
Whaling
Pharming

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a human based or software-based attack where the goal is to  pretend to be someone else for the purpose of identity concealment?
Spim
Spam
Spoofing
Pharming

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

refers to an individual who breaks encryption codes, defeats software copy protections, or specializes in breaking into systems
Hacker
Cracker
Black Hat
White Hat

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?