Cyber Security Knowledge Check

Cyber Security Knowledge Check

9th - 12th Grade

44 Qs

quiz-placeholder

Similar activities

Quiz sobre Diseño Gráfico y Tipos de Archivos de Imagen

Quiz sobre Diseño Gráfico y Tipos de Archivos de Imagen

10th Grade - University

45 Qs

INF Fase E Asessmen Sumatif Akhir

INF Fase E Asessmen Sumatif Akhir

10th Grade

40 Qs

programación orientada a objetos

programación orientada a objetos

11th Grade

40 Qs

Prueba Diagnóstico Tinkercad 9no

Prueba Diagnóstico Tinkercad 9no

9th Grade

40 Qs

MYOB Asyiik

MYOB Asyiik

11th Grade

40 Qs

TJBL  (JARINGAN BERBASIS LUAS)

TJBL (JARINGAN BERBASIS LUAS)

11th Grade

40 Qs

KTTX_L02_Khối 07

KTTX_L02_Khối 07

7th - 11th Grade

47 Qs

TIK kelas 7, Penilaian Tengah semester

TIK kelas 7, Penilaian Tengah semester

7th Grade - University

40 Qs

Cyber Security Knowledge Check

Cyber Security Knowledge Check

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Freddie Price

Used 18+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does malicious code include

viruses, Trojans; spyware and adware

phishing, pharming, harming and viruses

worms; passwords; biometrics and phishing

viruses; passwords; worms and phishing

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is any software designed to damage or to disrupt a system.

Malicious software (malware) 
Adware
Spyware
Phishing 

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.

A social engineer

Man-in-the-Middle

A Hacker

IT Technician

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Worms

do not change
can replicate itself to send to other uses to infect other computers
can take control of a computer and the hacker can use control the computer from somewhere else
 is a tube-shaped, segmented worm found in the phylum Annelida

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker has permission to hack?

Black Hat

Blue Hat

White Hat

Grey Hat

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following can be used to protect a network?

Firewall
Blocker
Server
Client

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of program can you install to prevent malware?

Antivirus software
Office software
A new operating system
A disk defragmenter

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?