Network Security

Network Security

9th Grade

13 Qs

quiz-placeholder

Similar activities

Access

Access

1st - 10th Grade

10 Qs

C# lesson10

C# lesson10

1st - 10th Grade

10 Qs

Konsep Routing

Konsep Routing

1st - 10th Grade

10 Qs

Cyber Security Homework 1

Cyber Security Homework 1

7th - 9th Grade

15 Qs

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

6th Grade - Professional Development

10 Qs

JUEGO - UNIDADES DE MEDIDA DE ALMACENAMIENTO

JUEGO - UNIDADES DE MEDIDA DE ALMACENAMIENTO

1st - 10th Grade

12 Qs

ICT Java programming workshop

ICT Java programming workshop

9th Grade

10 Qs

Binary

Binary

6th - 9th Grade

11 Qs

Network Security

Network Security

Assessment

Quiz

Computers

9th Grade

Practice Problem

Medium

Created by

Dave Gwilt

Used 359+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can copy itself and spread itself without human interaction.

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can appear harmless but is in fact malicious and can install a backdoor into your system?

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can encrypt your files and then require a payment to decrypt them.

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can copy itself and typically corrupts or deletes files. It is usually triggered by running an infected program.

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can record the keys that you type at the keyboard and sends them to a 3rd party?

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Phishing?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that redirects a user from a real URL to a website that looks real but is not.

Looking at someone entering their personal data into a system and copying what you see.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Pharming?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that redirects a user from a real URL to a website that looks real but is not.

Looking at someone entering their personal data into a system and copying what you see.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?