
Cybersecurity 1
Authored by David Jonathan Alford
Computers
5th Grade - University
Used 51+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the term for sending a fake email that looks like it's from a real company, to fool people?
Fishing
Farming
Phishing
Pharming
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is pharming?
Having users directed to a fake website instead of a genuine website, to fool them
Using software to watch what users do on their computer
Sending a fake email that looks genuine, to fool users
Buying collections of user profiles from hackers
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you be sure that a website is genuine
It will have a digital certificate
The text on the website will be spelled correctly
The website will have the real company logo on it
You found the website using a search engine
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a DNS (Domain Name Service) Server work?
The user computer sends the web address to the DNS Server, and the DNS Server directs the user computer to the correct IP address
The user computer sends its IP address to the DNS Server, and the DNS Server directs the user computer to the correct IP address
The user computer sends some keywords to the DNS Server, and the DNS Server provides a list of sites that contain those words
The server is overloaded with requests and cannot perform it's usual function
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a DOS (Denial of Service) attack affect a server?
The server is overloaded with requests and cannot perform it's usual function
The server cannot be found because it's address has been removed from the Domain Name Service
A hacker has removed the server from a search engine's database
A virus has infected the server and crashed the operating system
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is the best defence against hackers?
A firewall
A phishing filter
Up to date antivirus software
A trojan
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is a virus that pretends to be a harmless file?
trojan
worm
tracking cookie
cipher text
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
EMPTECH L4 Q3
Quiz
•
12th Grade
9 questions
Microbit Features Activity
Quiz
•
6th - 8th Grade
10 questions
Microcontroller
Quiz
•
11th Grade - University
14 questions
Input, output and storage de
Quiz
•
8th Grade - Professio...
10 questions
5. E-safety
Quiz
•
5th Grade
10 questions
TIN 11 - PYTHON - PHÉP TOÁN - BIỂU THỨC - CÂU LỆNH GÁN
Quiz
•
11th Grade
17 questions
ÔN TẬP GIỮA KÌ 1TIN 9
Quiz
•
8th Grade
10 questions
hardware and software(g3)
Quiz
•
2nd - 10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Computers
10 questions
Module 2 Vocab
Quiz
•
5th Grade
18 questions
[AP CSP] JavaScript Programming Lesson 2025-2026
Lesson
•
9th - 12th Grade
57 questions
[AP CSP] Unit 5 Review: Internet & Cybersecurity
Quiz
•
9th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
20 questions
CompTIA Network+ - Ports and Protocols
Quiz
•
University
15 questions
Google Sheets
Quiz
•
7th - 8th Grade
10 questions
Introduction to Coding
Interactive video
•
3rd - 6th Grade