Security Risks

Security Risks

10th Grade

15 Qs

quiz-placeholder

Similar activities

# REVIEW 1 DATA TYPES

# REVIEW 1 DATA TYPES

10th Grade

15 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

Basic Parts of Speech EPS

Basic Parts of Speech EPS

9th - 10th Grade

10 Qs

Network topologies

Network topologies

8th Grade - University

20 Qs

PUNCTUATION SPACING RULES

PUNCTUATION SPACING RULES

9th - 12th Grade

10 Qs

Chapter 7: System life cycle

Chapter 7: System life cycle

9th - 11th Grade

15 Qs

Arduino Loop

Arduino Loop

2nd Grade - University

20 Qs

Python List

Python List

4th Grade - University

15 Qs

Security Risks

Security Risks

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Ella Eusebio

Used 47+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Program or program code that can replicate/copy itself with the intention of deleting or corrupting files, or cause the computer to malfunction.

Hacking

Phishing

Viruses

Pharming

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Software that gathers information by monitoring key presses on the user’s keyboard; the information is then sent back to the person who sent the software.

Viruses

Hacking

Pharming

Spyware/key logging software

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malicious code installed on a user’s hard drive or on the web server; the code will redirect the user to a fake/bogus website without their knowledge.

Hacking

Viruses

Pharming

Phishing

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

•The act of gaining illegal access to a computer system.

Viruses

Hacking

Pharming

Phishing

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The creator sends out a legitimate-looking email; as soon as the recipient clicks on a link in the email/attachment, the user is sent to a fake/bogus website.

Viruses

Hacking

Pharming

Phishing

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The act of locating and using wireless internet connections illegally; it only requires a laptop (or other portable device), a wireless network card and an antenna to pick up wireless signals.

Viruses

Pharming

Wardriving

Spyware/key logger software

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a security risk of Viruses?

This can lead to fraud or identity theft

Can delete files/data

Can corrupt files/data

Can cause the computer to crash, stop functioning normally or become unresponsive.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?