Network Security

Quiz
•
Computers
•
9th Grade
•
Medium
Dave Gwilt
Used 346+ times
FREE Resource
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can copy itself and spread itself without human interaction.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can appear harmless but is in fact malicious and can install a backdoor into your system?
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can encrypt your files and then require a payment to decrypt them.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can copy itself and typically corrupts or deletes files. It is usually triggered by running an infected program.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can record the keys that you type at the keyboard and sends them to a 3rd party?
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is the best definition of Phishing?
Calling someone to create an invented situation that increases the chance they will share sensitive information with you.
Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.
A cyber attack that redirects a user from a real URL to a website that looks real but is not.
Looking at someone entering their personal data into a system and copying what you see.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is the best definition of Pharming?
Calling someone to create an invented situation that increases the chance they will share sensitive information with you.
Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.
A cyber attack that redirects a user from a real URL to a website that looks real but is not.
Looking at someone entering their personal data into a system and copying what you see.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
MALWAE AND ANTIVIRUS

Quiz
•
9th - 10th Grade
13 questions
Y9 Hwk Quiz 2 (rise of the bots)

Quiz
•
9th Grade
18 questions
Cyber Security

Quiz
•
9th - 12th Grade
12 questions
Malware Knowledge Quiz

Quiz
•
9th - 12th Grade
15 questions
Cyber Security

Quiz
•
9th - 12th Grade
10 questions
Data Security

Quiz
•
5th - 10th Grade
10 questions
Computer Viruses

Quiz
•
6th - 10th Grade
10 questions
Chapter 2 Intro to Cyber

Quiz
•
9th Grade
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Computers
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
24 questions
Scientific method and variables review

Quiz
•
9th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade
19 questions
Mental Health Vocabulary Pre-test

Quiz
•
9th Grade
14 questions
Points, Lines, Planes

Quiz
•
9th Grade