Search Header Logo

Unit 11 Cyber Security Threats

Authored by Jerry Jackson Bent

Computers

1st - 12th Grade

Used 22+ times

Unit 11 Cyber Security Threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is PHISHING?

Where a device is used to intercept packets of data as they are transferred across a network.

Where an executable file is secretly installed to record each key pressed and send

Writing a snippet of code to try and retrieve data from a machine

Sending emails pretending to be from reputable companies to try and get people to reveal personal information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDOS Attack?

Denial of System Attack

Deliberate Denial of System Attack

Denial of Service Attack

Distributed Denial of Service Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the most common methods used by cyber criminals? Used because people are generally trusting of others and this makes them a weak link where network security is concerned.

Viral Engineering

Social Engineering

Malware

Adware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call it when emails are disguised to look like they are from a trusted company, in order to gain access to confidential information.

Malware

Social Engineering

Phishing

Brute Force Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virus, worm, trojan, ransomware, spyware are all examples of what?

Advertising tools

Malware

Viruses

Infections

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rose just installed a new search engine on her laptop.now whenever she searches the internet, she gets several pop-up windows directing her to buy products.what does rose have?

ransomware
spyware
Adware
trojan horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IT security recently found a program on your co-worker's computer that apparently tracked all of the words that they typed into the computer. what kind of malware is this?

Keylogger 
keyblogger
trojan horse
keystroke virus

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?