Search Header Logo

Network Security

Authored by Dave Gwilt

Computers

9th Grade

13 Questions

Used 368+ times

Network Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can copy itself and spread itself without human interaction.

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can appear harmless but is in fact malicious and can install a backdoor into your system?

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can encrypt your files and then require a payment to decrypt them.

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can copy itself and typically corrupts or deletes files. It is usually triggered by running an infected program.

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can record the keys that you type at the keyboard and sends them to a 3rd party?

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Phishing?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that redirects a user from a real URL to a website that looks real but is not.

Looking at someone entering their personal data into a system and copying what you see.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Pharming?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that redirects a user from a real URL to a website that looks real but is not.

Looking at someone entering their personal data into a system and copying what you see.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers