Cybersecurity

Cybersecurity

9th - 12th Grade

22 Qs

quiz-placeholder

Similar activities

UNIT 1.2 MEMORY

UNIT 1.2 MEMORY

10th Grade

19 Qs

9.1 Homework #3

9.1 Homework #3

9th Grade

20 Qs

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

12th Grade

20 Qs

COMPRAR UNA LAPTOP

COMPRAR UNA LAPTOP

10th Grade

20 Qs

Visual Basic Assessment

Visual Basic Assessment

11th - 12th Grade

21 Qs

Word

Word

11th Grade

18 Qs

Evaluación Primer Periodo Excel

Evaluación Primer Periodo Excel

10th Grade

20 Qs

CORLANG Week6-7

CORLANG Week6-7

10th Grade - University

20 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Darren Hanson

Used 117+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a security threat?

Virus
Trojan
Firewall
Irresponsible User Practices

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a security threat?

Worm
Phishing
Black Hat Hacking
Antivirus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a defense strategy against security threats?

Assess Trustworthiness
Firewall
Private Browsing
Spam

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a defense strategy against security threats?

Antivirus
Adjust Privacy settings
Trojan
Cryptography

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the name given to the attempt to obtain sensitive information such as usernames and passwords, by disguising as a trustworthy entity in an electronic communication (e.g. creating a fake website)?

Trojan
Virus
Ransomware
Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the name given to the cyber-attack where the perpetrator seeks to make a machine unavailable to its intended users by temporarily disrupting its services, typically accomplished by flooding the targeted machine in an attempt to overload it?

Spam
Cyberbullying
Denial of Service (DoS)
Ransomware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the name given to the use of electronic messaging systems to send an unsolicited message, usually repeatedly?

Ransomware
CyberBullying
Spam
Denial of Service (DoS)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?