Wes downloads a free game to his computer. After installing the game, he notices his computer running very slowly. After running a check on his system, he discovers a virus is now on his computer. Wes is likely the victim of a

Threats to Networks & Their Data Pt 2

Quiz
•
Computers, Other
•
9th - 12th Grade
•
Hard
Michael Onda
Used 28+ times
FREE Resource
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
backdoor.
eavesdropping.
a drive-by download.
a Trojan horse.
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Mike is doing a web search to prepare for class. He finds a site that he thinks will help him. He clicks on the link to the site. Within 5 seconds of visiting the site, all the files on his computer have been encrypted and a ransom is being demanded; he is a victim of ransomware. How did his computer likely become infected with ransomware?
backdoor.
eavesdropping.
a drive-by download.
a Trojan horse.
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Ellen receives an email that looks like it is from her bank. It tells her that her account has been compromised and will be locked, and she must click on a link in the email to verify her account info. This is an example of
baiting.
scareware.
pretexting.
All options are true.
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Ellen receives an email that looks like it is from her bank. It tells her that her account has been compromised and will be locked, and she must click on a link in the email to verify her account info. This is an example of
pharming.
a watering hole.
spear phishing.
smishing.
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Jennifer, the Chief Security Officer for her company, discovers a backdoor has been installed on her company's network. Forensic analysis determines that it was installed when several company employees opened a PDF of the menu on the website for a deli across from their office. This is an example of
pharming.
a watering hole.
spear phishing.
smishing.
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Kevin, a cybersecurity analyst, is dealing with a ransomware infection in his company. Digital forensic analysis indicates that the virus was initially installed when an employee went to what looked like a legitimate and credible website but was actually a fake website; simply accessing the page initiated the install. The source of the ransomware was
pharming.
a watering hole.
spear phishing.
smishing.
Similar Resources on Quizizz
10 questions
eSecurity

Quiz
•
11th Grade
10 questions
Types of Attacks - Phishing

Quiz
•
9th - 12th Grade
9 questions
Protect your self from getting Scam.

Quiz
•
9th - 12th Grade
10 questions
CyperSecurity

Quiz
•
10th Grade
10 questions
Phishing and spam

Quiz
•
9th - 12th Grade
10 questions
cyber security qehs thing

Quiz
•
9th Grade - University
10 questions
Security of data

Quiz
•
10th Grade
10 questions
BTEC DIT C3 LAB - Why Systems Are Attacked

Quiz
•
10th - 11th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University