Cyber Security

Cyber Security

8th Grade

10 Qs

quiz-placeholder

Similar activities

HTML

HTML

8th - 12th Grade

15 Qs

Revision Quiz 2 - Information Technology

Revision Quiz 2 - Information Technology

7th - 8th Grade

10 Qs

Y10M2A2 - Selection

Y10M2A2 - Selection

6th - 10th Grade

15 Qs

Interesting Bird Facts

Interesting Bird Facts

KG - Professional Development

11 Qs

2.GRADE STORY 5

2.GRADE STORY 5

2nd Grade - University

15 Qs

Programming Lesson 3

Programming Lesson 3

6th - 8th Grade

12 Qs

Networking Quiz

Networking Quiz

8th - 9th Grade

15 Qs

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

2nd - 10th Grade

10 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

8th Grade

Hard

Created by

PArvez Raza

Used 177+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?

Adware

Spyware

Malware

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the

Antivirus

Cookies

Firewall

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. Which one of the following usually used in the process of Wi-Fi-hacking?

Aircrack-ng

Wireshark

Norton

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4.In system hacking, which of the following is the most crucial activity?

Information gathering

Covering tracks

Cracking passwords

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5.Which one of the following is actually considered as the first computer virus?

Sasser

Blaster

Creeper

Both A and C

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6.Which of the following can be considered as the elements of cyber security?

Application Security

Operational Security

Network Security

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which of the following statements is true about the Trojans?

Trojans perform tasks for which they are designed or programmed

Trojans replicates them self's or clone them self's through an infections

Trojans do nothing harmful to the user's computer systems

None of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?