Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

quiz-placeholder

Similar activities

network security

network security

9th Grade

15 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Quis Internet

Quis Internet

11th Grade

20 Qs

Malware

Malware

7th - 11th Grade

15 Qs

Network Threats

Network Threats

6th - 9th Grade

19 Qs

J277 1.4 Network Security Quiz (Forms of Attack)

J277 1.4 Network Security Quiz (Forms of Attack)

9th - 12th Grade

13 Qs

Empowerment Technologies

Empowerment Technologies

11th Grade

13 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Wendy Dyer

Used 143+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These are efforts by bad actors to profit from their malicious attacks.

Cybercrime

Botnets

Adware

VPN

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software exploit which in turns involves a combination of attacks against different vulnerabilities

blended threats

trojan horse

intranet

back doors

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It acts as a barrier between a trusted system or network and outside connections, such as the Internet.

firewall

spyware

phishing

encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _________ is an automated program that runs over the Internet

spyware

virus

worm

bot

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A feature or defect of a computer system that allows surreptitious unauthorized access to data

intranet

trojan horse

back doors

blended threat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Self replicating virus that does not alter files but resides in active memory and duplicates itself

worm

virus

spyware

trojan horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A planned event during which an organization simulates a cyber disruption to develop or test capabilities

internet

hacker

gateway

cyber exercise

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?