Threats to Networks & Their Data Pt 2

Threats to Networks & Their Data Pt 2

9th - 12th Grade

6 Qs

quiz-placeholder

Similar activities

Y9 Social Engineering

Y9 Social Engineering

9th Grade

10 Qs

ESTAFAS A TRAVÉS DE INTERNET

ESTAFAS A TRAVÉS DE INTERNET

12th Grade

5 Qs

Cybersecurity Quiz

Cybersecurity Quiz

11th Grade

11 Qs

Social Engineering

Social Engineering

10th Grade

11 Qs

Phishing and spam

Phishing and spam

9th - 12th Grade

10 Qs

Cambridge Technical Unit 3 LO1

Cambridge Technical Unit 3 LO1

11th Grade

10 Qs

Data Protection

Data Protection

KG - 12th Grade

10 Qs

Found. of IT: Security Threats - B

Found. of IT: Security Threats - B

9th - 12th Grade

10 Qs

Threats to Networks & Their Data Pt 2

Threats to Networks & Their Data Pt 2

Assessment

Quiz

Computers, Other

9th - 12th Grade

Hard

Created by

Michael Onda

Used 28+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Wes downloads a free game to his computer. After installing the game, he notices his computer running very slowly. After running a check on his system, he discovers a virus is now on his computer. Wes is likely the victim of a

backdoor.

eavesdropping.

a drive-by download.

a Trojan horse.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Mike is doing a web search to prepare for class. He finds a site that he thinks will help him. He clicks on the link to the site. Within 5 seconds of visiting the site, all the files on his computer have been encrypted and a ransom is being demanded; he is a victim of ransomware. How did his computer likely become infected with ransomware?

backdoor.

eavesdropping.

a drive-by download.

a Trojan horse.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Ellen receives an email that looks like it is from her bank. It tells her that her account has been compromised and will be locked, and she must click on a link in the email to verify her account info. This is an example of

baiting.

scareware.

pretexting.

All options are true.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Ellen receives an email that looks like it is from her bank. It tells her that her account has been compromised and will be locked, and she must click on a link in the email to verify her account info. This is an example of

pharming.

a watering hole.

spear phishing.

smishing.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Jennifer, the Chief Security Officer for her company, discovers a backdoor has been installed on her company's network. Forensic analysis determines that it was installed when several company employees opened a PDF of the menu on the website for a deli across from their office. This is an example of

pharming.

a watering hole.

spear phishing.

smishing.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Kevin, a cybersecurity analyst, is dealing with a ransomware infection in his company. Digital forensic analysis indicates that the virus was initially installed when an employee went to what looked like a legitimate and credible website but was actually a fake website; simply accessing the page initiated the install. The source of the ransomware was

pharming.

a watering hole.

spear phishing.

smishing.