Unit 11 Cyber Security Threats

Unit 11 Cyber Security Threats

1st - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Cybersecurity 1

Cybersecurity 1

8th Grade

18 Qs

Cyber security

Cyber security

10th - 11th Grade

19 Qs

BTEC Tech Award DIT - Threats to Data

BTEC Tech Award DIT - Threats to Data

9th Grade

10 Qs

Cyber Crime Lesson 2

Cyber Crime Lesson 2

7th Grade

17 Qs

Hackers and Malware

Hackers and Malware

8th Grade

15 Qs

Security Systems - Threats

Security Systems - Threats

10th Grade

14 Qs

Cyber Threats 1

Cyber Threats 1

4th Grade

10 Qs

Computer Virus

Computer Virus

7th - 8th Grade

15 Qs

Unit 11 Cyber Security Threats

Unit 11 Cyber Security Threats

Assessment

Quiz

Computers

1st - 12th Grade

Easy

Created by

Jerry Jackson Bent

Used 22+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is PHISHING?

Where a device is used to intercept packets of data as they are transferred across a network.

Where an executable file is secretly installed to record each key pressed and send

Writing a snippet of code to try and retrieve data from a machine

Sending emails pretending to be from reputable companies to try and get people to reveal personal information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDOS Attack?

Denial of System Attack

Deliberate Denial of System Attack

Denial of Service Attack

Distributed Denial of Service Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the most common methods used by cyber criminals? Used because people are generally trusting of others and this makes them a weak link where network security is concerned.

Viral Engineering

Social Engineering

Malware

Adware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call it when emails are disguised to look like they are from a trusted company, in order to gain access to confidential information.

Malware

Social Engineering

Phishing

Brute Force Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virus, worm, trojan, ransomware, spyware are all examples of what?

Advertising tools

Malware

Viruses

Infections

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rose just installed a new search engine on her laptop.now whenever she searches the internet, she gets several pop-up windows directing her to buy products.what does rose have?
ransomware
spyware
Adware
trojan horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IT security recently found a program on your co-worker's computer that apparently tracked all of the words that they typed into the computer. what kind of malware is this?
Keylogger 
keyblogger
trojan horse
keystroke virus

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?