Cyber Security

Cyber Security

Assessment

Quiz

Computers

8th - 9th Grade

Hard

Used 215+ times

FREE Resource

Student preview

quiz-placeholder

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is NOT a security threat?
Worm
Phishing
Black Hat Hacking
Antivirus

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What's the name given to the attempt to obtain sensitive information such as usernames and passwords, by disguising as a trustworthy entity in an electronic communication (e.g. creating a fake website)?
Trojan
Virus
Ransomware
Phishing

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What's the name given to the cyber-attack where the perpetrator seeks to make a machine unavailable to its intended users by temporarily disrupting its services, typically accomplished by flooding the targeted machine in an attempt to overload it?
Spam
Cyberbullying
Denial of Service (DoS)
Ransomware

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What's the name given to the malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid?
Spam
Ransomware
Denial of Service (DoS)
CyberBullying

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is NOT a type of CyberSecurity Attack?
Ransomware
Denial of Service (DoS)
Responsible Password Management
CyberBullying

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is NOT a type of CyberSecurity Attack?
Ransomware
Identity Theft
Keep your system updated
CyberBullying

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Viruses, worms, and trojans are common security threats that are often used in spreading. What is the name for them all?
scams
malware
downloads
passwords

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers