
Cyber Security
Authored by PArvez Raza
Computers
8th Grade
Used 181+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
Adware
Spyware
Malware
All of the above
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
2. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the
Antivirus
Cookies
Firewall
Malware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
3. Which one of the following usually used in the process of Wi-Fi-hacking?
Aircrack-ng
Wireshark
Norton
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
4.In system hacking, which of the following is the most crucial activity?
Information gathering
Covering tracks
Cracking passwords
None of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
5.Which one of the following is actually considered as the first computer virus?
Sasser
Blaster
Creeper
Both A and C
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
6.Which of the following can be considered as the elements of cyber security?
Application Security
Operational Security
Network Security
All of the above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
7. Which of the following statements is true about the Trojans?
Trojans perform tasks for which they are designed or programmed
Trojans replicates them self's or clone them self's through an infections
Trojans do nothing harmful to the user's computer systems
None of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?