Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

quiz-placeholder

Similar activities

Malware

Malware

9th - 11th Grade

15 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

Data Security & Data Integrity

Data Security & Data Integrity

10th - 11th Grade

21 Qs

G11&&12_Quiz1_2024_Cybersecurity

G11&&12_Quiz1_2024_Cybersecurity

12th Grade

20 Qs

Malware & Hacking

Malware & Hacking

10th Grade

14 Qs

Network Security

Network Security

9th Grade

13 Qs

Viruses and Malware

Viruses and Malware

7th - 9th Grade

20 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Wendy Dyer

Used 131+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These are efforts by bad actors to profit from their malicious attacks.

Cybercrime

Botnets

Adware

VPN

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software exploit which in turns involves a combination of attacks against different vulnerabilities

blended threats

trojan horse

intranet

back doors

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It acts as a barrier between a trusted system or network and outside connections, such as the Internet.

firewall

spyware

phishing

encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _________ is an automated program that runs over the Internet

spyware

virus

worm

bot

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A feature or defect of a computer system that allows surreptitious unauthorized access to data

intranet

trojan horse

back doors

blended threat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Self replicating virus that does not alter files but resides in active memory and duplicates itself

worm

virus

spyware

trojan horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A planned event during which an organization simulates a cyber disruption to develop or test capabilities

internet

hacker

gateway

cyber exercise

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?