
CyperSecurity
Authored by Rashed Alshamsi
Computers
10th Grade
Used 13+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Information can be accessed only by those who should see it. In cybersecurity, this is known as ...................
confidentiality
integrity
availability
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A(/An) ___________ is an exchange where one gives up one thing in order to get something else that one also wants.
malware
cybersecurity
trade-off
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A(/An) ____________ malware aims to encrypt computer files and ask for money from the owner to recover the data.
backdoor
ransomware
trojan
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
______________ cyberattack tries to send huge amount of network traffic to the host until it stops working.
denial of service
distribution of servers
dot on supply
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
___________ malware delivers advertisements to the user on a web browser automatically.
trojan horse
adware
scareware
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
___________ malware replicates itself and spreads from one computer to another through the network.
spyware
adware
worm
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The degree to which something is fit to be used is known as usability.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?