Recap

Recap

1st Grade

9 Qs

quiz-placeholder

Similar activities

Grade 2 - Pollution and Climate Change

Grade 2 - Pollution and Climate Change

1st - 2nd Grade

10 Qs

The Amish

The Amish

KG - University

12 Qs

Present

Present

1st Grade

12 Qs

Dla Arturka

Dla Arturka

1st Grade

10 Qs

Tips and Tricks of Asthma care

Tips and Tricks of Asthma care

1st - 5th Grade

10 Qs

MINI GAME CHÌA KHÓA KHỞ NGHIỆP

MINI GAME CHÌA KHÓA KHỞ NGHIỆP

1st - 3rd Grade

10 Qs

Marketing

Marketing

1st - 10th Grade

10 Qs

Engleski jezik

Engleski jezik

1st - 4th Grade

10 Qs

Recap

Recap

Assessment

Quiz

Education

1st Grade

Practice Problem

Medium

Created by

Alaa Fadl

Used 17+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Information can be accessed only by those who should see it. In cybersecurity, this is known as_______________.

confidentiality

integrity

availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(/An) ____________ malware aims to encrypt computer files and ask for money from the owner to recover the data.

backdoor

ransomware

virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(/An) ___________ is an exchange where one gives up one thing in order to get something else that one also wants.

virus

cybersecurity

trade off

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______________ cyberattack tries to send huge amount of network traffic to the host until it stops working.

denial of service

dot on supply

data of server

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ malware delivers advertisements to the user on a web browser automatically.

trojan horse

adware

backdoor

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ahmad is using the same password for all his accounts. This is a good cybersecurity practice.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password from below is the most difficult for a brute-force cyberattack to find?

Hi_People@123

123

Pass

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any software that is written to harm or cause issues to a computer system is known as ____________.

a programming language

malware

an application

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ malware replicates itself and spreads from one computer to another through the network.

worm

adware

spyware