Recap

Recap

1st Grade

9 Qs

quiz-placeholder

Similar activities

Educação Digital - Vírus

Educação Digital - Vírus

1st - 3rd Grade

10 Qs

quiz informatyczny

quiz informatyczny

1st - 3rd Grade

10 Qs

Prawo autorskie

Prawo autorskie

1st Grade

6 Qs

DBI 2025

DBI 2025

1st - 5th Grade

11 Qs

Virus Informáticos

Virus Informáticos

1st - 5th Grade

7 Qs

Sistema da Informação M2 2BIM

Sistema da Informação M2 2BIM

1st Grade

10 Qs

IDA Unit 2

IDA Unit 2

1st - 5th Grade

9 Qs

Klik Dengan Bijak

Klik Dengan Bijak

1st Grade - Professional Development

10 Qs

Recap

Recap

Assessment

Quiz

Education

1st Grade

Medium

Created by

Alaa Fadl

Used 17+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Information can be accessed only by those who should see it. In cybersecurity, this is known as_______________.

confidentiality

integrity

availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(/An) ____________ malware aims to encrypt computer files and ask for money from the owner to recover the data.

backdoor

ransomware

virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(/An) ___________ is an exchange where one gives up one thing in order to get something else that one also wants.

virus

cybersecurity

trade off

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______________ cyberattack tries to send huge amount of network traffic to the host until it stops working.

denial of service

dot on supply

data of server

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ malware delivers advertisements to the user on a web browser automatically.

trojan horse

adware

backdoor

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ahmad is using the same password for all his accounts. This is a good cybersecurity practice.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password from below is the most difficult for a brute-force cyberattack to find?

Hi_People@123

123

Pass

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any software that is written to harm or cause issues to a computer system is known as ____________.

a programming language

malware

an application

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ malware replicates itself and spreads from one computer to another through the network.

worm

adware

spyware