Cyber Security

Cyber Security

6th - 9th Grade

24 Qs

quiz-placeholder

Similar activities

Coding Karel 2

Coding Karel 2

KG - University

20 Qs

Administrasi Sistem jaringan KD1

Administrasi Sistem jaringan KD1

1st - 10th Grade

20 Qs

PH-1 KELAS 7 SMT 1

PH-1 KELAS 7 SMT 1

7th Grade

25 Qs

LATIHAN SOAL INFORMATIKA BAB 9 KELAS VII

LATIHAN SOAL INFORMATIKA BAB 9 KELAS VII

7th Grade

20 Qs

SOFTWARE 7I

SOFTWARE 7I

7th Grade - University

20 Qs

Computer 5

Computer 5

4th - 6th Grade

20 Qs

Animated Canvas

Animated Canvas

9th - 12th Grade

19 Qs

Dampak Sosial Informatika

Dampak Sosial Informatika

9th Grade

20 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

6th - 9th Grade

Practice Problem

Medium

CCSS
RI.5.10, RI.6.4, RI.7.4

+2

Standards-aligned

Created by

James Gilman

Used 92+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

The attempt to acquire sensitive information such as usernames, passwords, and credit card details by pretending you are a trustworthy entity in an electronic communication is known as?

Converting

Hacking

Phishing

Fishing

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems is known as?

Malware
Operating System
Device Driver

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.

Ethical hacker
Programer
Social Engineer

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A malware program that, when executed, replicates by inserting copies of itself into other computer programs is known as?

Covid-19

Virus

Spoofing

Rhinovirus

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Software that aims to gather information about a person or organization without their knowledge?

Spyware

Spam

Trojan Horse

Fishing

6.

MULTIPLE CHOICE QUESTION

5 mins • 12 pts

Unsolicited electronic messages, especially advertising is know as?

Spim
Spam
Ransomware

Tags

CCSS.RI.5.10

CCSS.RI.6.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed is known as?

Ransomware
Virus
Spim
Spam

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?