Cyber Security and E Commerce

Cyber Security and E Commerce

10th - 12th Grade

47 Qs

quiz-placeholder

Similar activities

Business in the Real World Knowledge Test

Business in the Real World Knowledge Test

9th - 12th Grade

50 Qs

Business Essentials 2.01/2.02

Business Essentials 2.01/2.02

9th - 12th Grade

47 Qs

Virtual Business Semester Review Part 2

Virtual Business Semester Review Part 2

11th Grade

48 Qs

CW Y10 Opt 1,2

CW Y10 Opt 1,2

10th Grade

42 Qs

Intro to Business Chapter 2

Intro to Business Chapter 2

9th - 12th Grade

45 Qs

Business Final Review

Business Final Review

9th - 12th Grade

50 Qs

Career Clusters

Career Clusters

3rd - 12th Grade

50 Qs

Entrepreneurship Recap

Entrepreneurship Recap

12th Grade - University

46 Qs

Cyber Security and E Commerce

Cyber Security and E Commerce

Assessment

Quiz

Business

10th - 12th Grade

Hard

Created by

Carmen James

Used 20+ times

FREE Resource

47 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An Antivirus protects you from all attacks

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

Malicious Code

Computer Worm

Anti Virus Software

Computer Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is the type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.

Computer Virus

Computer Worm

MyDoom

Malicious Code

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does malware get onto your computer?
Email attachments or links
By visiting dodgy websites
On USB sticks
All of the above

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of these are common methods that could be used to infect a computer with malware?

spam email

out of date firewall

Distributed denial of service

bookmarking a page

variable computer synchroniser

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which apply to phishing?

The art of catching aquatic animals with a rod

Using a malicious medium, disguised as a trustworthy source, to get users to reveal personal information

Physically threatening someone until they give up personal data

Personally hacking someone to get personal information

Usually an attack made via email

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are ways that an operating system can increase system security?

Offering the use of password protection

Different levels of user access

Keeping software updated

Disk Defragmentation

The use of virtual memory

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?