Cybersecurity

Cybersecurity

9th - 12th Grade

22 Qs

quiz-placeholder

Similar activities

Teknik Pengolahan Audio dan Video

Teknik Pengolahan Audio dan Video

12th Grade

20 Qs

El Computador

El Computador

5th - 11th Grade

20 Qs

Traffic Light Project Quiz

Traffic Light Project Quiz

9th Grade

17 Qs

CSS - Computer Systems Services

CSS - Computer Systems Services

12th Grade

20 Qs

Yr7- Understanding computers Lessons 1-3

Yr7- Understanding computers Lessons 1-3

7th - 11th Grade

20 Qs

Diagramas de Flujo

Diagramas de Flujo

12th Grade

21 Qs

Hardware and Components

Hardware and Components

5th - 11th Grade

19 Qs

Bài 11. Tệp và quản lý tệp

Bài 11. Tệp và quản lý tệp

10th Grade

20 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Darren Hanson

Used 117+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a security threat?

Virus
Trojan
Firewall
Irresponsible User Practices

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a security threat?

Worm
Phishing
Black Hat Hacking
Antivirus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a defense strategy against security threats?

Assess Trustworthiness
Firewall
Private Browsing
Spam

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a defense strategy against security threats?

Antivirus
Adjust Privacy settings
Trojan
Cryptography

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the name given to the attempt to obtain sensitive information such as usernames and passwords, by disguising as a trustworthy entity in an electronic communication (e.g. creating a fake website)?

Trojan
Virus
Ransomware
Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the name given to the cyber-attack where the perpetrator seeks to make a machine unavailable to its intended users by temporarily disrupting its services, typically accomplished by flooding the targeted machine in an attempt to overload it?

Spam
Cyberbullying
Denial of Service (DoS)
Ransomware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the name given to the use of electronic messaging systems to send an unsolicited message, usually repeatedly?

Ransomware
CyberBullying
Spam
Denial of Service (DoS)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?