Search Header Logo

Cybersecurity - Quarterly 1

Authored by Adam Rippeth

Computers

9th - 12th Grade

Used 3+ times

Cybersecurity - Quarterly 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that encrypts programs and data until a ransom is paid to remove it.

Crypto-malware

Spyware

Ransomware

Adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program that appears desirable but actually contains something harmful.

Crypto-malware

Trojan Horse

Program Virus

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Item that has value.

Integrity

Asset

Malware

Risk

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware that encrypts all the files on the device so that they cannot be opened.

Crypto-malware

Malware

Ransomware

Dumpster Diving

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information is correct and unaltered.

Risk

Hactivists

Integrity

Keylogger

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that records keystrokes.

Macro Virus

Mitigate

Hactivists

Keylogger

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Individual who lacks advanced knowledge of computers and networks and so uses downloaded automated attack software to attack information systems.

Bot Herder

Script Kiddie

Threat Actor

Nation State Actor

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?