Network Security

Network Security

10th Grade

12 Qs

quiz-placeholder

Similar activities

2.3.2 and 2.3.3 Cyber Stopping Malware and Server Attacks

2.3.2 and 2.3.3 Cyber Stopping Malware and Server Attacks

9th - 12th Grade

15 Qs

J808 LO4.1.2 Malware

J808 LO4.1.2 Malware

10th - 11th Grade

12 Qs

Conditionals Unit Quiz

Conditionals Unit Quiz

9th Grade - University

15 Qs

Audio Engineering

Audio Engineering

7th - 12th Grade

16 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Types of Software

Types of Software

4th - 12th Grade

15 Qs

Virus and Antivirus

Virus and Antivirus

10th Grade

10 Qs

Network Security

Network Security

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

Created by

Trent Russell

Used 165+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program hiding inside a useful program with malicious purposes.

Trojan

Worm

Ransomeware

Phisphing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Able to attack the network using a smart device with low security like a thermostate, or home sercurity

Rootkits

Denial of Service

Zero Day Exploit

IOT Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Everyone receives the same email in the office stating that they need to download the app to to prevent their computer for viruses. Thus allowing attacker gain access to your computer

Worms

Phisphing

Ransomware

Man in the Middle Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Legitimate software, where they can gain remote control and administration-level access over a system

Ransomware

Rootkits

Zero Day Exploit

DOS Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Taking an advantage of the small window when firmware being updated and before it's implimementd

Zero Day Exploit

Virus

Worm

Password Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program that is designed to overwhelm email servers and cause DOS

Worm

Trojan

Ransomeware

Spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacker intercepts a two-party transaction, inserting themselves in the middle to steal and manipulate information

RootKits

Zero Day Exploit

DOS

Man In the Middle(MitM)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?