Network Security

Quiz
•
Computers
•
9th Grade
•
Medium
Dave Gwilt
Used 348+ times
FREE Resource
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can copy itself and spread itself without human interaction.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can appear harmless but is in fact malicious and can install a backdoor into your system?
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can encrypt your files and then require a payment to decrypt them.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can copy itself and typically corrupts or deletes files. It is usually triggered by running an infected program.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can record the keys that you type at the keyboard and sends them to a 3rd party?
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is the best definition of Phishing?
Calling someone to create an invented situation that increases the chance they will share sensitive information with you.
Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.
A cyber attack that redirects a user from a real URL to a website that looks real but is not.
Looking at someone entering their personal data into a system and copying what you see.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is the best definition of Pharming?
Calling someone to create an invented situation that increases the chance they will share sensitive information with you.
Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.
A cyber attack that redirects a user from a real URL to a website that looks real but is not.
Looking at someone entering their personal data into a system and copying what you see.
Create a free account and access millions of resources
Similar Resources on Wayground
11 questions
Threats to Data

Quiz
•
9th - 12th Grade
18 questions
Cybersecurity Vocabulary 2022

Quiz
•
9th - 12th Grade
15 questions
Cyber Security Homework 2

Quiz
•
7th - 9th Grade
11 questions
20. Cybersecurity Malware Quiz

Quiz
•
9th - 12th Grade
18 questions
Cyber Security and Social Engineering

Quiz
•
9th - 11th Grade
10 questions
Malware Introduction

Quiz
•
5th - 10th Grade
15 questions
Malware

Quiz
•
9th - 11th Grade
16 questions
Evaluación de Utilitarios

Quiz
•
4th Grade - University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
30 questions
Introduction to Computers

Quiz
•
8th - 9th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
20 questions
Hardware vs. Software Quiz

Quiz
•
7th - 10th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade