
CamTech Network Security
Authored by Jonathan Wharmby
Computers
8th - 12th Grade
Used 528+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
I look like a normal piece of software but secretly I will infect your system – What am i?
Trojan Horse
Virus
Phishing Email
Ransomware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
I lock all your files until you pay for them to be unlocked – if you don’t pay in 24 hours, I will delete them all – What am i?
Spyware
Ransomware
Malware
Virus
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
I bombard the network with requests using bots, which crashes the network – What am i?
Spyware
Malware
Firewall
DDOS
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
I don’t know your name, but I contact you anyway. I depend on your participation to be successful. – What am i?
SPAM Email
Phishing Email
Fishing Email
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
I scan the network, I also scan the computers. If I find something malicious, I remove it.
Disk Defragmenter
Firewall
System Update
Anti-Virus Software
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
I sit between the internet and the network. I protect the network, by blocking viruses, malware and worms. I can be both hardware and software
Router
Firewall
Ethernet Cable
Modem
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
DDOS Attack stands for what?
Distributed Denial of Service Attack
Domain Denial of System Attack
Digital Denial of System Attack
Digital Denial of Service Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?