Network Security
Quiz
•
Computers
•
9th Grade
•
Practice Problem
•
Medium
Dave Gwilt
Used 359+ times
FREE Resource
Enhance your content in a minute
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can copy itself and spread itself without human interaction.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can appear harmless but is in fact malicious and can install a backdoor into your system?
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can encrypt your files and then require a payment to decrypt them.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can copy itself and typically corrupts or deletes files. It is usually triggered by running an infected program.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can record the keys that you type at the keyboard and sends them to a 3rd party?
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is the best definition of Phishing?
Calling someone to create an invented situation that increases the chance they will share sensitive information with you.
Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.
A cyber attack that redirects a user from a real URL to a website that looks real but is not.
Looking at someone entering their personal data into a system and copying what you see.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is the best definition of Pharming?
Calling someone to create an invented situation that increases the chance they will share sensitive information with you.
Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.
A cyber attack that redirects a user from a real URL to a website that looks real but is not.
Looking at someone entering their personal data into a system and copying what you see.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
ICT Java programming workshop
Quiz
•
9th Grade
10 questions
Bilgisayarın Temel Birimleri
Quiz
•
9th Grade - University
15 questions
BÀI 16 - THUẬT TOÁN SẮP XẾP
Quiz
•
9th Grade - University
10 questions
Konsep Routing
Quiz
•
1st - 10th Grade
15 questions
J808 LO1 and LO2 planning project keywords / terms
Quiz
•
9th - 11th Grade
10 questions
INTERNET AND INTRANET
Quiz
•
9th - 11th Grade
15 questions
Cyber Security Homework 1
Quiz
•
7th - 9th Grade
12 questions
JUEGO - UNIDADES DE MEDIDA DE ALMACENAMIENTO
Quiz
•
1st - 10th Grade
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
