
Cybersecurity
Authored by Darren Hanson
Computers
9th - 12th Grade
Used 131+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is NOT a security threat?
Virus
Trojan
Firewall
Irresponsible User Practices
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is NOT a security threat?
Worm
Phishing
Black Hat Hacking
Antivirus
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is NOT a defense strategy against security threats?
Assess Trustworthiness
Firewall
Private Browsing
Spam
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is NOT a defense strategy against security threats?
Antivirus
Adjust Privacy settings
Trojan
Cryptography
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What's the name given to the attempt to obtain sensitive information such as usernames and passwords, by disguising as a trustworthy entity in an electronic communication (e.g. creating a fake website)?
Trojan
Virus
Ransomware
Phishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What's the name given to the cyber-attack where the perpetrator seeks to make a machine unavailable to its intended users by temporarily disrupting its services, typically accomplished by flooding the targeted machine in an attempt to overload it?
Spam
Cyberbullying
Denial of Service (DoS)
Ransomware
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What's the name given to the use of electronic messaging systems to send an unsolicited message, usually repeatedly?
Ransomware
CyberBullying
Spam
Denial of Service (DoS)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?