CSF Week 2

CSF Week 2

University

10 Qs

quiz-placeholder

Similar activities

Parcial 1, Primera serie

Parcial 1, Primera serie

6th Grade - University

10 Qs

Aprendeu ou disfarçou?

Aprendeu ou disfarçou?

12th Grade - Professional Development

10 Qs

Adobe Photoshop

Adobe Photoshop

University

10 Qs

UX Design

UX Design

University

10 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Quizz Internet

Quizz Internet

KG - Professional Development

12 Qs

OOP 1 Undiksha

OOP 1 Undiksha

12th Grade - University

13 Qs

Chapter 3 Exploring Linux Filesystems

Chapter 3 Exploring Linux Filesystems

11th Grade - University

10 Qs

CSF Week 2

CSF Week 2

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

PRASHIL Security

Used 31+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a malware that copy themselves throughout a computer or network?

Trojans

Virus

Worm

Spyware

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is true regarding Trojans? (Any Two)

Trojans work by creating a back door

Trojan are self-replicating and autonomous programs

Trojan is a software that appears to do one function but does another.

Trojan exploits weaknesses in an operating system to damage a network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of social engineering?

Sabotage a person's social media 

To catfish someone

To build trust

To gain vital personal information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An email claiming that you have won the lottery, as long as you fill out the corresponding information, is an example of what type social engineering attack?

Spamming

Phishing

Baiting

Spying

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?

Spyware

Worm

Trojan

Adware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What damage can be caused by malware?

Computer crashes

Permanent deletion

Identity theft

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability?

Any weakness in a system

Action that can harm or adversely affect a system

Taking advantage of weakness to compromise a system

probability of exposure, loss of critical assets and sensitive information

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers